Sciweavers

5843 search results - page 132 / 1169
» Software Security in Practice
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 8 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CARDIS
2008
Springer
106views Hardware» more  CARDIS 2008»
15 years 6 months ago
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices
Abstract. In this paper we describe the first implementation on smartcard of the code-based authentication protocol proposed by Stern at Crypto'93 and we give a securization o...
Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Pr...
DATE
2009
IEEE
117views Hardware» more  DATE 2009»
15 years 11 months ago
An architecture for secure software defined radio
Chunxiao Li, Anand Raghunathan, Niraj K. Jha
ISCA
2007
IEEE
109views Hardware» more  ISCA 2007»
15 years 10 months ago
Raksha: a flexible information flow architecture for software security
Michael Dalton, Hari Kannan, Christos Kozyrakis