Sciweavers

410 search results - page 24 / 82
» Software Protection with Code Mobility
Sort
View
74
Voted
ADAEUROPE
2005
Springer
15 years 4 months ago
Extending Ravenscar with CSP Channels
Abstract. The Ravenscar Profile is a restricted subset of the Ada tasking model, designed to meet the requirements of producing analysable and deterministic code. A central featur...
Diyaa-Addein Atiya, Steve King
IEEEIA
2009
14 years 8 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
ICSE
2000
IEEE-ACM
15 years 2 months ago
Software engineering for mobility: a roadmap
The term distributed computing conjures the image of a fixed network structure whose nodes support the execution of processes that communicate with each other via messages traveli...
Gruia-Catalin Roman, Gian Pietro Picco, Amy L. Mur...
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
15 years 7 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...
84
Voted
EUROSYS
2007
ACM
15 years 7 months ago
Sealing OS processes to improve dependability and safety
In most modern operating systems, a process is a -protected abstraction for isolating code and data. This protection, however, is selective. Many common mechanisms—dynamic code ...
Galen C. Hunt, Mark Aiken, Manuel Fähndrich, ...