Sciweavers

8623 search results - page 230 / 1725
» Software engineering for secure systems
Sort
View
ISSTA
2004
ACM
15 years 11 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
ASPLOS
2006
ACM
15 years 11 months ago
Improving software security via runtime instruction-level taint checking
Current taint checking architectures monitor tainted data usage mainly with control transfer instructions. An alarm is raised once the program counter becomes tainted. However, su...
Jingfei Kong, Cliff Changchun Zou, Huiyang Zhou
CSFW
2005
IEEE
15 years 11 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
WETICE
1998
IEEE
15 years 9 months ago
Software Agents: Process Models and User Profiles in Distributed Software Development
The development of software products has become a highly cooperative and distributed activity involving working groups at geographically distinct places. These groups show an incr...
Norbert Glaser, Jean-Claude Derniame
WCRE
1995
IEEE
15 years 9 months ago
Strongest Postcondition Semantics as the Formal Basis for Reverse Engineering
Reverse engineering of program code is the process of constructing a higher level abstraction of an implementation in order to facilitate the understanding of a system that may be...
Gerald C. Gannod, Betty H. C. Cheng