Sciweavers

861 search results - page 110 / 173
» Ranking Privacy Policy
Sort
View
ACSAC
2009
IEEE
15 years 6 months ago
Surgically Returning to Randomized lib(c)
—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X) and address space layout randomization (ASLR) are typically used in combination. T...
Giampaolo Fresi Roglia, Lorenzo Martignoni, Robert...
IDTRUST
2009
ACM
15 years 6 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
IEEEARES
2007
IEEE
15 years 6 months ago
AProSec: an Aspect for Programming Secure Web Applications
Adding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should tak...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...
ACSAC
2005
IEEE
15 years 5 months ago
A User-level Framework for Auditing and Monitoring
Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implemen...
Yongzheng Wu, Roland H. C. Yap
CSFW
2005
IEEE
15 years 5 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook