Sciweavers

785 search results - page 105 / 157
» Static Analysis of Android Programs
Sort
View
SP
2008
IEEE
15 years 8 months ago
Preventing Memory Error Exploits with WIT
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
Periklis Akritidis, Cristian Cadar, Costin Raiciu,...
RTAS
2006
IEEE
15 years 8 months ago
Estimating the Worst-Case Energy Consumption of Embedded Software
The evolution of battery technology is not being able to keep up with the increasing performance demand of mobile embedded systems. Therefore, battery life has become an important...
Ramkumar Jayaseelan, Tulika Mitra, Xianfeng Li
CSFW
2005
IEEE
15 years 7 months ago
End-to-End Availability Policies and Noninterference
This paper introduces the use of static information flow analysis for the specification and enforcement of end-toend availability policies in programs. We generalize the decentr...
Lantian Zheng, Andrew C. Myers
FUIN
2010
97views more  FUIN 2010»
15 years 16 days ago
Game Solution, Epistemic Dynamics and Fixed-Point Logics
Abstract. Current methods for solving games embody a form of “procedural rationality” that invites logical analysis in its own right. This paper is a brief case study of Backwa...
Johan van Benthem, Amélie Gheerbrant
USS
2010
14 years 12 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...