Sciweavers

74 search results - page 7 / 15
» Addressing Software Security and Mitigations in the Life Cyc...
Sort
View
OOPSLA
2005
Springer
14 years 1 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
ICSE
1994
IEEE-ACM
13 years 11 months ago
SAAM: A Method for Analyzing the Properties of Software Architectures
While software architecture has become an increasingly important research topic in recent years, insufficient attention has been paid to methods for evaluation of these architectu...
Rick Kazman, Leonard J. Bass, Mike Webb, Gregory D...
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 7 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
CCS
2011
ACM
12 years 7 months ago
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications
We empirically analyzed sanitizer use in a shipping web application with over 400,000 lines of code and over 23,244 methods, the largest empirical analysis of sanitizer use of whi...
Prateek Saxena, David Molnar, Benjamin Livshits
MDAFA
2004
Springer
178views Hardware» more  MDAFA 2004»
14 years 1 months ago
Model Bus: Towards the Interoperability of Modelling Tools
MDA software development requires the interoperability of a wide range of modelling services (operations taking models as inputs and outputs), such as model edition, model transfor...
Xavier Blanc, Marie-Pierre Gervais, Prawee Sriplak...