Sciweavers

5843 search results - page 104 / 1169
» Software Security in Practice
Sort
View
DRM
2004
Springer
15 years 9 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
ACSAC
1999
IEEE
15 years 8 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
96
Voted
SEC
2007
15 years 5 months ago
FirePatch: Secure and Time-Critical Dissemination of Software Patches
Because software security patches contain information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is...
Håvard D. Johansen, Dag Johansen, Robbert va...
ESSOS
2010
Springer
16 years 27 days ago
Secure Code Generation for Web Applications
Martin Johns, Christian Beyerlein, Rosemaria Giese...
CISIS
2009
IEEE
15 years 11 months ago
A Secure RFID Authentication Protocol with Low Communication Cost
Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko M...