Sciweavers

252 search results - page 44 / 51
» Protecting Software Code by Guards
Sort
View
NSPW
2006
ACM
15 years 3 months ago
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
Spyware, Adware, Bots. In each case, there is significant evidence that there is an increasing financial motivation behind the writing and distribution of these programs. In thi...
Richard Ford, Sarah Gordon
ACSAC
2005
IEEE
15 years 3 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
WCRE
2005
IEEE
15 years 3 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
CC
2005
Springer
120views System Software» more  CC 2005»
15 years 3 months ago
Data Slicing: Separating the Heap into Independent Regions
In this paper, we present a formal description of data slicing, which is a type-directed program transformation technique that separates a program’s heap into several independent...
Jeremy Condit, George C. Necula
IOLTS
2005
IEEE
125views Hardware» more  IOLTS 2005»
15 years 3 months ago
Design of a Self Checking Reed Solomon Encoder
— In this paper, an innovative self-checking Reed Solomon encoder architecture is described. The presented architecture exploits some properties of the arithmetic operations in G...
Gian-Carlo Cardarilli, Salvatore Pontarelli, Marco...