Sciweavers

293 search results - page 17 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
CSFW
2004
IEEE
13 years 11 months ago
From Stack Inspection to Access Control: A Security Analysis for Libraries
We present a new static analysis for reviewing the security of libraries for systems, such as JVMs or the CLR, that rely on stack inspection for access control. We describe its im...
Frédéric Besson, Tomasz Blanc, C&eac...
ICWS
2009
IEEE
14 years 4 months ago
A Tool for Choreography Analysis Using Collaboration Diagrams
Analyzing interactions among peers that interact via messages is a crucial problem due to increasingly distributed nature of current software systems, especially the ones built us...
Tevfik Bultan, Chris Ferguson, Xiang Fu
DAC
2003
ACM
14 years 8 months ago
State-based power analysis for systems-on-chip
Early power analysis for systems-on-chip (SoC) is crucial for determining the appropriate packaging and cost. This early analysis commonly relies on evaluating power formulas for ...
Reinaldo A. Bergamaschi, Yunjian Jiang
COMSWARE
2008
IEEE
14 years 2 months ago
On implementing security at the transport layer
— We design a framework that implements security at the TCP layer to meet the necessity for a practical and truly end-to-end security solution. We call our framework TCPsec. TCPs...
Swaminathan Pichumani, Sneha Kumar Kasera
WWW
2004
ACM
14 years 8 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...