Sciweavers

5843 search results - page 140 / 1169
» Software Security in Practice
Sort
View
CCS
2001
ACM
15 years 9 months ago
Protecting Software Code by Guards
Abstract. Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protectin...
Hoi Chang, Mikhail J. Atallah
ACSAC
2010
IEEE
15 years 2 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 10 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
114
Voted
SIGSOFT
2009
ACM
16 years 5 months ago
Automated security testing of web widget interactions
Cor-Paul Bezemer, Ali Mesbah, Arie van Deursen
ESSOS
2010
Springer
16 years 1 months ago
Model-Driven Security Policy Deployment: Property Oriented Approach
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...