Sciweavers

4731 search results - page 196 / 947
» Securing Interactive Programs
Sort
View
104
Voted
ESSOS
2010
Springer
15 years 11 months ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer
106
Voted
IWSEC
2009
Springer
15 years 8 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
101
Voted
CCS
2005
ACM
15 years 7 months ago
Control-flow integrity
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
Martín Abadi, Mihai Budiu, Úlfar Erl...
98
Voted
CHI
2009
ACM
15 years 9 months ago
Mediating programming through chat for the OLPC
We built a text-based programming environment that enables youth to design and implement a chat client for the One Laptop per Child XO. The environment allows users to program and...
Jill P. Dimond, Sarita Yardi, Mark Guzdial
102
Voted
PC
1998
110views Management» more  PC 1998»
15 years 1 months ago
Compiler-Based Tools for Analyzing Parallel Programs
In this paper, we present several tools for analyzing parallel programs. The tools are built on top of a compiler infrastructure, which provides advanced capabilities for symbolic...
Brian Armstrong, Seon Wook Kim, Insung Park, Micha...