Sciweavers

2236 search results - page 179 / 448
» Secure Software Design in Practice
Sort
View
CCS
2010
ACM
15 years 4 months ago
Security analysis of India's electronic voting machines
Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, kn...
Scott Wolchok, Eric Wustrow, J. Alex Halderman, Ha...
118
Voted
XPU
2004
Springer
15 years 9 months ago
Going Interactive: Combining Ad-Hoc and Regression Testing
Abstract. Different kinds of unit testing activities are used in practice. Organised unit testing (regression testing or test-first activities) are very popular in commercial pract...
Michael Kölling, Andrew Patterson
ACSAC
2010
IEEE
15 years 2 months ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
189
Voted
OOPSLA
2009
Springer
15 years 10 months ago
Supporting model evolution through demonstration-based model transformation
Model evolution is often supported by writing model transformation rules in specialized languages. This presents challenges to those who are unfamiliar with model transformation l...
Yu Sun
OOPSLA
2005
Springer
15 years 9 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....