Sciweavers

276 search results - page 34 / 56
» Security in Context: Analysis and Refinement of Software Arc...
Sort
View
ASPLOS
2006
ACM
15 years 7 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
SIGSOFT
2004
ACM
15 years 6 months ago
Variability management with feature-oriented programming and aspects
This paper presents an analysis of feature-oriented and aspectoriented modularization approaches with respect to variability management as needed in the context of system families...
Mira Mezini, Klaus Ostermann
CODES
2001
IEEE
15 years 5 months ago
Embedded UML: a merger of real-time UML and co-design
In this paper, we present a proposal for a UML profile called `Embedded UML'. Embedded UML represents a synthesis of various ideas in the real-time UML community, and concept...
Grant Martin, Luciano Lavagno, Jean Louis-Guerin
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 1 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
14 years 5 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...