Sciweavers

2213 search results - page 189 / 443
» Software Security
Sort
View
117
Voted
CHES
2010
Springer
172views Cryptology» more  CHES 2010»
15 years 4 months ago
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described tha...
Jean-Sébastien Coron, Ilya Kizhvatov
122
Voted
OOPSLA
2004
Springer
15 years 9 months ago
RUBiS revisited: why J2EE benchmarking is hard
We have replicated the experiments of Cecchet et al. detailed in ”Performance and Scalability of EJB Applications” at OOPSLA ’02. We report on our experiences configuring, ...
William Pugh, Jaime Spacco
118
Voted
CHI
2007
ACM
16 years 4 months ago
Noticing notice: a large-scale experiment on the timing of software license agreements
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report ...
Nathaniel Good, Jens Grossklags, Deirdre K. Mullig...
145
Voted
SAFECOMP
2005
Springer
15 years 9 months ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...
153
Voted
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 9 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan