Machines for Communication Security Pierre Bieber, Nora Boulahia-Cuppens Thomas Lehmann, Erich van Wickeren ONERA-CERT CAP debis GEI 2 Av. E. Belin Oxfordstr. 12-16 F-31055, Toulou...
Pierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, ...
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Proof-carrying code (PCC) is a general framework that can, in principle, verify safety properties of arbitrary machine-language programs. Existing PCC systems and typed assembly l...
While performance specifications are verified before sign-off for a modern nanometer scale design, extensive application of optical proximity correction substantially alters the l...
Puneet Gupta, Andrew B. Kahng, Youngmin Kim, Denni...
Polynomial identity testing (PIT) problem is known to be challenging even for constant depth arithmetic circuits. In this work, we study the complexity of two special but natural ...