Sciweavers

410 search results - page 42 / 82
» Software Protection with Code Mobility
Sort
View
82
Voted
CHI
2007
ACM
16 years 25 days ago
Computer aided observations of complex mobile situations
Designing mobile and wearable applications is a challenge. The context of use is more important than ever and traditional methodologies for elicitation and specification reach the...
Tobias Klug
79
Voted
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
15 years 9 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
SAC
2005
ACM
15 years 6 months ago
A generic serializer for mobile devices
In this paper we describe a serializer component completely realized in .NET managed code, able to run on a stripped versions of the .NET platform (e.g., Compact Framework) and st...
Mattia Monga, Angelo Scotto
CCS
2007
ACM
15 years 6 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
105
Voted
CCS
2009
ACM
15 years 3 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...