Sciweavers

357 search results - page 18 / 72
» Code security analysis with assertions
Sort
View
SCN
2008
Springer
194views Communications» more  SCN 2008»
13 years 9 months ago
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
We improve our proposal of a new variant of the McEliece cryptosystem based on QC-LDPC codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to now,...
Marco Baldi, Marco Bodrato, Franco Chiaraluce
SOCO
2008
Springer
13 years 9 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
DIMVA
2009
13 years 11 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
14 years 2 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
CCS
2008
ACM
13 years 12 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...