Sciweavers

1548 search results - page 35 / 310
» Estimating Software Vulnerabilities
Sort
View
105
Voted
ICSE
2005
IEEE-ACM
16 years 2 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
CODES
1999
IEEE
15 years 6 months ago
A compilation-based software estimation scheme for hardware/software co-simulation
Marcello Lajolo, Mihai Lazarescu, Alberto L. Sangi...
133
Voted
CCS
2009
ACM
15 years 9 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
92
Voted
CSMR
2003
IEEE
15 years 7 months ago
Fast Flow Analysis to Compute Fuzzy Estimates of Risk Levels
Ettore Merlo, Giuliano Antoniol, Pierre-Luc Brunel...
69
Voted
CODES
2000
IEEE
15 years 7 months ago
Energy estimation for 32-bit microprocessors
ר Ñ Ø ÓÒ Ó ×Ó ØÛ Ö ÔÓÛ Ö ÓÒ×ÙÑÔØ ÓÒ × ÓÑ Ò ÓÒ Ó Ø Ñ ÓÖ ÔÖÓ Ð Ñ× ÓÖ Ñ ÒÝ Ñ ÔÔÐ Ø ÓÒ׺ Ì Ô Ô Ö ÔÖ × ÒØ× ÒÓÚ Ð ...
Carlo Brandolese, William Fornaciari, Fabio Salice...