Sciweavers

2257 search results - page 201 / 452
» Secure program partitioning
Sort
View
114
Voted
CGO
2006
IEEE
15 years 6 months ago
Selecting Software Phase Markers with Code Structure Analysis
Most programs are repetitive, where similar behavior can be seen at different execution times. Algorithms have been proposed that automatically group similar portions of a program...
Jeremy Lau, Erez Perelman, Brad Calder
99
Voted
CSFW
2005
IEEE
15 years 6 months ago
Belief in Information Flow
To reason about information flow based on beliefs, a new model is developed that describes how attacker beliefs change due to the attacker’s observation of the execution of a p...
Michael R. Clarkson, Andrew C. Myers, Fred B. Schn...
79
Voted
IJSN
2006
78views more  IJSN 2006»
15 years 22 days ago
An approach to synthesise safe systems
: Detectors are system components that identify whether the system is in a particular state. Detectors can be used to ensure arbitrary safety properties for systems, that is, they ...
Arshad Jhumka, Felix C. Freiling, Christof Fetzer,...
121
Voted
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 20 days ago
Expressive Declassification Policies and Modular Static Enforcement
This paper provides a way to specify expressive declassification policies, in particular, when, what, and where policies that include conditions under which downgrading is allowed...
Anindya Banerjee, David A. Naumann, Stan Rosenberg
90
Voted
WWW
2006
ACM
16 years 1 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...