Sciweavers

2213 search results - page 277 / 443
» Software Security
Sort
View
115
Voted
SIGSOFT
2000
ACM
15 years 8 months ago
Bugs in the programs
Fuzzing is a well-known black-box approach to the security testing of applications. Fuzzing has many advantages in terms of simplicity and effectiveness over more complex, expensi...
Richard D. Pethia
141
Voted
CCS
1994
ACM
15 years 7 months ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
192
Voted
COMPSAC
2004
IEEE
15 years 7 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...
145
Voted
SACRYPT
2000
Springer
145views Cryptology» more  SACRYPT 2000»
15 years 7 months ago
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced...
Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, M...
133
Voted
USS
2008
15 years 6 months ago
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST
The State of Ohio commissioned the EVEREST study in late summer of 2007. The study participants were charged with an analysis of the usability, stability, and security of all voti...
Kevin R. B. Butler, William Enck, Harri Hursti, St...