Sciweavers

277 search results - page 17 / 56
» Timing-Sensitive Information Flow Analysis for Synchronous S...
Sort
View
PLDI
2006
ACM
15 years 5 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
ACSAC
2007
IEEE
15 years 6 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
ESORICS
2010
Springer
15 years 5 hour ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
ICC
2007
IEEE
118views Communications» more  ICC 2007»
15 years 6 months ago
Analysis of Timing Error Detectors for Orthogonal Space-Time Block Codes
Abstract—We analyze the properties of a class of low complexity timing error detectors for the purpose of timing error tracking in orthogonal space-time block coding receivers. F...
Pawel A. Dmochowski, Peter J. McLane
APVIS
2011
13 years 11 months ago
Edge maps: Representing flow with bounded error
Robust analysis of vector fields has been established as an important tool for deriving insights from the complex systems these fields model. Many analysis techniques rely on co...
Harsh Bhatia, Shreeraj Jadhav, Peer-Timo Bremer, G...