Sciweavers

427 search results - page 6 / 86
» Applying Aspect-Orientation in Designing Security Systems: A...
Sort
View
ECEASST
2010
13 years 2 months ago
Security Evaluation and Hardening of Free and Open Source Software (FOSS)
Abstract: Recently, Free and Open Source Software (FOSS) has emerged as an alternative to Commercial-Off-The-Shelf (COTS) software. Now, FOSS is perceived as a viable long-term sol...
Robert Charpentier, Mourad Debbabi, Dima Alhadidi,...
CODES
2007
IEEE
14 years 1 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
ITCC
2005
IEEE
14 years 1 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
SEUS
2005
IEEE
14 years 1 months ago
A Case Study on Partial Evaluation in Embedded Software Design
Source code generators are often applied in embedded systems design to combine the flexibility necessary for reusability with the performance of highly specialized software. Howe...
Michael Jung, Ralf Laue 0002, Sorin A. Huss
MSR
2010
ACM
13 years 9 months ago
Identifying security bug reports via text mining: An industrial case study
-- A bug-tracking system such as Bugzilla contains bug reports (BRs) collected from various sources such as development teams, testing teams, and end users. When bug reporters subm...
Michael Gegick, Pete Rotella, Tao Xie