Sciweavers

416 search results - page 15 / 84
» Some new approaches for preventing software tampering
Sort
View
EUROSYS
2009
ACM
15 years 8 months ago
Privacy-preserving browser-side scripting with BFlow
Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conï¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
CCS
2007
ACM
15 years 5 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
CSSE
2008
IEEE
15 years 5 months ago
Lean Implementations of Software Testing Tools Using XML Representations of Source Codes
—By utilizing XML representations of source programs under test, a new approach is proposed to concisely implement some prototypes for TACCLE, a software testing methodology. The...
Yu Xia Sun, Huo Yan Chen, T. H. Tse
SISW
2003
IEEE
15 years 4 months ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...
COMPSAC
2008
IEEE
15 years 5 months ago
Dealing with the Crosscutting Structure of Software Architectural Styles
Architecture-based software development is the implementation of a software system in terms of its architectural constructs (e.g., components, connectors, ports). It has been show...
Sam Malek