Sciweavers

2257 search results - page 146 / 452
» Secure program partitioning
Sort
View
84
Voted
IFIP
2007
Springer
15 years 6 months ago
Cyber Security: Are Economic Incentives Adequate?
Protecting national critical infrastructure assets from cyber incidents is an important challenge. One facet of this challenge is that the vast majority of the owners and operators...
Scott Dynes, Eric Goetz, Michael Freeman
ICALP
2004
Springer
15 years 6 months ago
Deciding Knowledge in Security Protocols Under Equational Theories
The analysis of security protocols requires precise formulations of the knowledge of protocol participants and attackers. In formal approaches, this knowledge is often treated in t...
Martín Abadi, Véronique Cortier
112
Voted
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
15 years 7 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
OOPSLA
2009
Springer
15 years 7 months ago
A type and effect system for deterministic parallel Java
Today’s shared-memory parallel programming models are complex and error-prone. While many parallel programs are intended to be deterministic, unanticipated thread interleavings ...
Robert L. Bocchino Jr., Vikram S. Adve, Danny Dig,...
IEEEARES
2008
IEEE
15 years 7 months ago
Type and Effect Annotations for Safe Memory Access in C
In this paper, we present a novel type and effect analysis for detecting memory errors in C source code. We extend the standard C type system with effect, region, and host annotat...
Syrine Tlili, Mourad Debbabi