Sciweavers

2236 search results - page 216 / 448
» Secure Software Design in Practice
Sort
View
AGILEDC
2007
IEEE
15 years 10 months ago
Automated Recognition of Test-Driven Development with Zorro
Zorro is a system designed to automatically determine whether a developer is complying with an operational definition of Test-Driven Development (TDD) practices. Automated recogn...
Philip M. Johnson, Hongbing Kou
141
Voted
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
15 years 7 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...
138
Voted
CCS
2008
ACM
15 years 5 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
199
Voted
SOSP
2009
ACM
16 years 19 days ago
Automatically patching errors in deployed software
We present ClearView, a system for automatically patching errors in deployed software. ClearView works on stripped Windows x86 binaries without any need for source code, debugging...
Jeff H. Perkins, Sunghun Kim, Samuel Larsen, Saman...
155
Voted
EMSOFT
2001
Springer
15 years 8 months ago
Some Synchronization Issues When Designing Embedded Systems from Components
Abstract This paper is sort of a confession. Issues of synchrony, asynchrony, and synchronization, arise frequently in designing embedded systems from components, like everyone I k...
Albert Benveniste