Sciweavers

416 search results - page 25 / 84
» Some new approaches for preventing software tampering
Sort
View
BIS
2008
152views Business» more  BIS 2008»
15 years 28 days ago
Mobile Social Software for Cultural Heritage: A Reference Model
Abstract. Web 2.0, also known as the Social Web, marks a new philosophy where users are both the main actors and the content producers: users write blogs and comments, they tag, li...
Paolo Coppola, Raffaella Lomuscio, Stefano Mizzaro...
CD
2004
Springer
15 years 4 months ago
Dynamic Deployment of Executing and Simulating Software Components
Physical boundaries have caused software systems to become less monolithic and more distributed. The trend is progressing to a point where software systems will consist of numerous...
Alexander Egyed
CCS
2009
ACM
15 years 6 months ago
English shellcode
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an att...
Joshua Mason, Sam Small, Fabian Monrose, Greg MacM...
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 3 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
SIGSOFT
2006
ACM
16 years 6 days ago
Failure proximity: a fault localization-based approach
Recent software systems usually feature an automated failure reporting system, with which a huge number of failing traces are collected every day. In order to prioritize fault dia...
Chao Liu 0001, Jiawei Han