Sciweavers

739 search results - page 86 / 148
» A security framework for the analysis and design of software...
Sort
View
PODS
2005
ACM
136views Database» more  PODS 2005»
14 years 9 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
14 years 2 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
IWC
2011
111views more  IWC 2011»
13 years 3 months ago
Socio-technical systems: From design methods to systems engineering
The importance of adopting a socio-technical approach to system development is recognised by many but not widely practised. We analyse the reasons for this, considering the histor...
Gordon D. Baxter, Ian Sommerville
EMSOFT
2005
Springer
14 years 2 months ago
Model-based analysis of distributed real-time embedded system composition
Key challenges in distributed real-time embedded (DRE) system developments include safe composition of system components and mapping the functional specifications onto the target...
Gabor Madl, Sherif Abdelwahed
ASPLOS
2006
ACM
14 years 2 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...