Sciweavers

177 search results - page 28 / 36
» Provably Secure Key Exchange: An Engineering Approach
Sort
View
MIDDLEWARE
2007
Springer
15 years 3 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
CASES
2004
ACM
15 years 3 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
IUI
2010
ACM
15 years 2 months ago
Towards a reputation-based model of social web search
While web search tasks are often inherently collaborative in nature, many search engines do not explicitly support collaboration during search. In this paper, we describe HeyStaks...
Kevin KcNally, Michael P. O'Mahony, Barry Smyth, M...
SYRCODIS
2008
135views Database» more  SYRCODIS 2008»
14 years 11 months ago
Realizing Fine-Granular and Scalable Transaction Isolation in Native XML Databases
Based on loosely coupled services in an XML engine, we describe how to realize fine-grained lock protocols, which can guarantee transaction isolation for applications using differ...
Sebastian Bächle, Theo Härder
PLDI
2010
ACM
15 years 2 months ago
Mixing type checking and symbolic execution
Static analysis designers must carefully balance precision and efficiency. In our experience, many static analysis tools are built around an elegant, core algorithm, but that alg...
Yit Phang Khoo, Bor-Yuh Evan Chang, Jeffrey S. Fos...