Sciweavers

2236 search results - page 51 / 448
» Secure Software Design in Practice
Sort
View
ICRE
1998
IEEE
15 years 4 months ago
Scenario Usage in System Development: A Report on Current Practice
: Scenario-based approaches are becoming ubiquitous in systems analysis and design but their definition and scope remain vague. Complementing the recently proposed CREWS classifica...
Klaus Weidenhaupt, Klaus Pohl, Matthias Jarke, Pet...
OOPSLA
2007
Springer
15 years 6 months ago
Compile-time execution structure of object-oriented programs with practical ownership domain annotations
Ownership domain annotations express and enforce design intent related to object encapsulation and communication directly in real object-oriented code. First, this work will make ...
Marwan Abi-Antoun
SOSP
2007
ACM
15 years 8 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
FPL
2003
Springer
114views Hardware» more  FPL 2003»
15 years 5 months ago
Power Analysis of FPGAs: How Practical is the Attack?
Recent developments in information technologies made the secure transmission of digital data a critical design point. Large data flows have to be exchanged securely and involve en...
François-Xavier Standaert, Loïc van Ol...
COMPSAC
2009
IEEE
15 years 3 months ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye