Sciweavers

1953 search results - page 237 / 391
» codes 2010
Sort
View
122
Voted
ESSOS
2010
Springer
15 years 10 months ago
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks
Web browsers that support a safe language such as Javascript are becoming a platform of great interest for security attacks. One such attack is a heap-spraying attack: a new kind o...
Francesco Gadaleta, Yves Younan, Wouter Joosen
132
Voted
TRUST
2010
Springer
15 years 10 months ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
ADAEUROPE
2010
Springer
15 years 9 months ago
Practical Limits on Software Dependability: A Case Study
The technology for building dependable computing systems has advanced dramatically. Nevertheless, there is still no complete solution to building software for critical systems in w...
Patrick J. Graydon, John C. Knight, Xiang Yin
DEON
2010
Springer
15 years 9 months ago
Relevance, Derogation and Permission
Abstract. We show that a recently developed theory of positive permission based on the notion of derogation is hampered by a triviality result that indicates a problem with the und...
Audun Stolpe
136
Voted
ICMT
2010
Springer
15 years 9 months ago
Improving Higher-Order Transformations Support in ATL
Abstract. In Model-Driven Engineering (MDE), Higher-Order Transformations (HOTs) are model transformations that analyze, produce or manipulate other model transformations. In a pre...
Massimo Tisi, Jordi Cabot, Frédéric ...