Sciweavers

519 search results - page 32 / 104
» Control flow obfuscation with information flow tracking
Sort
View
CADE
2005
Springer
14 years 9 months ago
Privacy-Sensitive Information Flow with JML
In today's society, people have very little control over what kinds of personal data are collected and stored by various agencies in both the private and public sectors. We de...
Guillaume Dufay, Amy P. Felty, Stan Matwin
ITNG
2008
IEEE
14 years 3 months ago
On the Properties of System-Wide Responsive Behavior
High contention of flows is associated with unstable network behavior and unmanageable resource administration, i.e., convergence to equilibrium becomes a difficult task. In this ...
Ageliki Tsioliaridou, Vassilis Tsaoussidis
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
14 years 3 months ago
Quantifying Information Leaks in Outbound Web Traffic
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’...
Kevin Borders, Atul Prakash
INFOCOM
2006
IEEE
14 years 2 months ago
Flow Control Over Wireless Network and Application Layer Implementation
— Flow control, including congestion control for data transmission, and rate control for multimedia streaming, is an important issue in information transmission in both wireline ...
Minghua Chen, Avideh Zakhor
RTCSA
2000
IEEE
14 years 1 months ago
Extracting safe and precise control flow from binaries
As a starting point for static program analysis a control flow graph (CFG) is needed. If only the binary executable is available, this CFG has to be reconstructed from sequences ...
Henrik Theiling