Sciweavers

5843 search results - page 143 / 1169
» Software Security in Practice
Sort
View
ICASSP
2011
IEEE
14 years 8 months ago
Analysis of the security of linear blinding techniques from an information theoretical point of view
We propose a novel model to characterize the security of linear blinding techniques. The proposed model relates the security of blinding to the possibility of estimating the blind...
Tiziano Bianchi, Alessandro Piva, Mauro Barni
ICSE
2009
IEEE-ACM
15 years 11 months ago
Modeling in Software Engineering (MiSE 09)
The Modeling in Software Engineering (MiSE) workshop series provides a forum for discussing the challenges associated with modeling software and with incorporating modeling practi...
Robert Baillargeon, Bernhard Rumpe, Steven Vö...
WISA
2005
Springer
15 years 10 months ago
Software Protection Through Dynamic Code Mutation
Abstract. Reverse engineering of executable programs, by disassembling them and then using program analyses to recover high level semantic information, plays an important role in a...
Matias Madou, Bertrand Anckaert, Patrick Moseley, ...
EWSN
2009
Springer
16 years 5 months ago
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node...
Wen Hu, Peter I. Corke, Wen Chan Shih, Leslie Over...
DISCEX
2003
IEEE
15 years 9 months ago
An Aspect-Oriented Security Framework
The security of a software system is an attribute that permeates the whole system. As such, any attempt to address security concerns in a software system must, of necessity, be gl...
Viren Shah, Frank Hill