Sciweavers

416 search results - page 45 / 84
» Some new approaches for preventing software tampering
Sort
View
CASCON
1997
97views Education» more  CASCON 1997»
15 years 2 months ago
Using shim technology to monitor DCE runtime performance
Obtaining performance data for application or system software is typically di cult, especially when the source code is not available. While popular techniques such as event trappi...
Gregory M. Oster, Richard B. Bunt
IJFCS
2006
110views more  IJFCS 2006»
15 years 1 months ago
Sat-based Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this re...
Fang Yu, Bow-Yaw Wang
OOPSLA
2005
Springer
15 years 6 months ago
Ercatons and organic programming: say good-bye to planned economy
Organic programming (OP) is our proposed and already emerging programming model which overcomes some of the limitations of current practice in software development in general and ...
Oliver Imbusch, Falk Langhammer, Guido von Walter
CF
2004
ACM
15 years 6 months ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
EUROSYS
2008
ACM
15 years 10 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman