Sciweavers

410 search results - page 10 / 82
» Software Protection with Code Mobility
Sort
View
SAC
2011
ACM
14 years 1 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
ECIS
2003
14 years 11 months ago
The impact of software patents on the structure of the software market - a simulation model
The issue of software patents is widely discussed in Europe today. The standard economic rationale for patents is to protect potential innovators from imitation, which ultimately ...
Norman Hoppen, Daniel Beimborn, Wolfgang Köni...
CODES
2007
IEEE
15 years 4 months ago
A data protection unit for NoC-based architectures
Security is gaining increasing relevance in the development of embedded devices. Towards a secure system at each level of design, this paper addresses the security aspects related...
Leandro Fiorin, Gianluca Palermo, Slobodan Lukovic...
SIGSOFT
2003
ACM
15 years 11 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ACSAC
2010
IEEE
14 years 8 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...