Sciweavers

519 search results - page 42 / 104
» Control flow obfuscation with information flow tracking
Sort
View
ESOP
2007
Springer
14 years 23 days ago
Controlling the What and Where of Declassification in Language-Based Security
Abstract. While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end confidentiality guarantees, one must also permit possibilities for declassific...
Heiko Mantel, Alexander Reinhard
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 9 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
JLP
2010
142views more  JLP 2010»
13 years 3 months ago
Relational bytecode correlations
We present a calculus for tracking equality relationships between values through pairs of bytecode programs. The calculus may serve as a certification mechanism for noninterferenc...
Lennart Beringer
WCE
2007
13 years 10 months ago
A Multi-Agent Approach for Intelligent Traffic-Light Control
—In this paper we propose a multi-agent approach for traffic-light control. According to this approach, our system consists of agents and their world. In this context, the world ...
Visit Hirankitti, Jaturapith Krohkaew, Christopher...
EMMCVPR
2009
Springer
14 years 23 days ago
Reconstructing Optical Flow Fields by Motion Inpainting
An edge-sensitive variational approach for the restoration of optical flow fields is presented. Real world optical flow fields are frequently corrupted by noise, reflection artifac...
Benjamin Berkels, Claudia Kondermann, Christoph S....