Sciweavers

357 search results - page 10 / 72
» Code security analysis with assertions
Sort
View
WEWORC
2007
132views Cryptology» more  WEWORC 2007»
13 years 11 months ago
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
Abstract. Courtois, Finiasz and Sendrier proposed in 2001 a practical code-based signature scheme. We give a rigorous security analysis of a modified version of this scheme in the...
Léonard Dallot
CODES
2003
IEEE
14 years 3 months ago
Security wrappers and power analysis for SoC technologies
Future wireless internet enabled devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although SoCs offer more resi...
Catherine H. Gebotys, Y. Zhang
ISSTA
2012
ACM
12 years 7 days ago
Detecting inconsistencies via universal reachability analysis
Recent research has suggested that a large class of software bugs fall into the category of inconsistencies, or cases where two pieces of program code make incompatible assumption...
Aaron Tomb, Cormac Flanagan
ESEM
2008
ACM
13 years 11 months ago
An empirical model to predict security vulnerabilities using code complexity metrics
Complexity is often hypothesized to be the enemy of software security. If this hypothesis is true, complexity metrics may be used to predict the locale of security problems and ca...
Yonghee Shin, Laurie Williams
ISW
2000
Springer
14 years 1 months ago
Towards a Practical Secure Framework for Mobile Code Commerce
Securing the mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must ...
Gaël Hachez, Laurent Den Hollander, Mehrdad J...