Sciweavers

357 search results - page 6 / 72
» Code security analysis with assertions
Sort
View
INFOCOM
1996
IEEE
14 years 1 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
ICSE
2007
IEEE-ACM
14 years 10 months ago
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis
This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that securit...
Vinod Ganapathy, Dave King 0002, Trent Jaeger, Som...
EUC
2005
Springer
14 years 3 months ago
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code
Jianyong Huang, Jennifer Seberry, Willy Susilo, Ma...
ACSAC
1999
IEEE
14 years 2 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
CCS
2009
ACM
14 years 10 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov