Sciweavers

410 search results - page 8 / 82
» Software Protection with Code Mobility
Sort
View
DATE
2008
IEEE
89views Hardware» more  DATE 2008»
15 years 4 months ago
Software Protection Mechanisms for Dependable Systems
We expect that in future commodity hardware will be used in safety critical applications. But the used commodity microprocessors will become less reliable because of decreasing fe...
Ute Wappler, Martin Muller
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
15 years 4 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
103
Voted
TIC
2000
Springer
116views System Software» more  TIC 2000»
15 years 1 months ago
Sharing in Typed Module Assembly Language
Abstract. There is a growing need to provide low-overhead softwarebased protection mechanisms to protect against malicious or untrusted code. Type-based approaches such as proof-ca...
Dominic Duggan
ICSE
2000
IEEE-ACM
15 years 1 months ago
Implementing incremental code migration with XML
We demonstrate how XML and related technologies can be used for code mobility at any granularity, thus overcoming the restrictions of existing approaches. By not fixing a particul...
Wolfgang Emmerich, Cecilia Mascolo, Anthony Finkel...