Sciweavers

2213 search results - page 122 / 443
» Software Security
Sort
View
EMISA
2004
Springer
15 years 8 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
145
Voted
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 7 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
125
Voted
ENTCS
2008
79views more  ENTCS 2008»
15 years 3 months ago
j-POST: a Java Toolchain for Property-Oriented Software Testing
Abstract. j-POST is an integrated toolchain for property-oriented software testing. This toolchain includes a test designer, a test generator, and a test execution engine. The test...
Yliès Falcone, Laurent Mounier, Jean-Claude...
CSFW
2012
IEEE
13 years 5 months ago
Secure Compilation to Modern Processors
—We present a secure (fully abstract) compilation scheme to compile an object-based high-level language to lowchine code. Full abstraction is achieved by relying on a fine-grain...
Pieter Agten, Raoul Strackx, Bart Jacobs, Frank Pi...
113
Voted
ESSOS
2010
Springer
16 years 8 days ago
Experiences with PDG-Based IFC
Information flow control systems provide the guarantees that are required in today’s security-relevant systems. While the literature has produced a wealth of techniques to ensur...
Christian Hammer