Sciweavers

577 search results - page 46 / 116
» Engineering Sufficiently Secure Computing
Sort
View
SCAM
2008
IEEE
15 years 9 months ago
Precise Analysis of Java Programs Using JOANA
The JOANA project (Java Object-sensitive ANAlysis) is a program analysis infrastructure for the Java language. It contains a wide range of analysis techniques such as dependence g...
Dennis Giffhorn, Christian Hammer
139
Voted
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
15 years 15 days ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
145
Voted
IPC
2007
IEEE
15 years 9 months ago
Ubiquitous TV Delivery to the Masses
The vision of ubiquitous delivery of TV streams to the masses at high quality is tantalizing. However, today, TV streaming is either limited to fixed wired outlets (IPTV), or it i...
Roger Karrer, Doris Reim
134
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 6 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
141
Voted
CCS
2003
ACM
15 years 7 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves