Sciweavers

2213 search results - page 46 / 443
» Software Security
Sort
View
ADAEUROPE
2006
Springer
15 years 5 months ago
Secure Execution of Computations in Untrusted Hosts
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...
ICFEM
2009
Springer
14 years 9 months ago
Improving Automatic Verification of Security Protocols with XOR
Abstract. K
Xihui Chen, Ton van Deursen, Jun Pang
NSPW
2004
ACM
15 years 5 months ago
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Konstantin Beznosov, Philippe Kruchten
IEEEARES
2010
IEEE
15 years 4 months ago
Configuration Fuzzing for Software Vulnerability Detection
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environ...
Huning Dai, Christian Murphy, Gail E. Kaiser
IWSEC
2009
Springer
15 years 6 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...