Sciweavers

519 search results - page 5 / 104
» Control flow obfuscation with information flow tracking
Sort
View
ECIR
2010
Springer
13 years 9 months ago
Mining Neighbors' Topicality to Better Control Authority Flow
Web pages are often recognized by others through contexts. These contexts determine how linked pages influence and interact with each other. When differentiating such interactions,...
Na Dai, Brian D. Davison, Yaoshuang Wang
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
13 years 11 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
ICSM
2007
IEEE
14 years 1 months ago
Matching Control Flow of Program Versions
In many application areas, including piracy detection, software debugging and maintenance, situations arise in which there is a need for comparing two versions of a program that d...
Vijayanand Nagarajan, Rajiv Gupta, Matias Madou, X...
DICTA
2009
13 years 8 months ago
Improved Simultaneous Computation of Motion Detection and Optical Flow for Object Tracking
Abstract--Object tracking systems require accurate segmentation of the objects from the background for effective tracking. Motion segmentation or optical flow can be used to segmen...
Simon Denman, Clinton Fookes, Sridha Sridharan
SE
2010
13 years 9 months ago
Towards Information Flow Auditing in Workflows
: The paper proposes an approach for compliance audits in workflow environments based on the tracking of information flow. Requirements are formalized as a binary relation on the w...
Claus Wonnemann