Sciweavers

819 search results - page 97 / 164
» Fractal symbolic analysis
Sort
View
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 10 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
ICCAD
2008
IEEE
106views Hardware» more  ICCAD 2008»
14 years 6 months ago
Process variability-aware transient fault modeling and analysis
– Due to reduction in device feature size and supply voltage, the sensitivity of digital systems to transient faults is increasing dramatically. As technology scales further, the...
Natasa Miskov-Zivanov, Kai-Chiang Wu, Diana Marcul...
ICCAD
2005
IEEE
90views Hardware» more  ICCAD 2005»
14 years 6 months ago
Scalable compositional minimization via static analysis
State-equivalence based reduction techniques, e.g. bisimulation minimization, can be used to reduce a state transition system to facilitate subsequent verification tasks. However...
Fadi A. Zaraket, Jason Baumgartner, Adnan Aziz
PEPM
2009
ACM
14 years 6 months ago
Program analysis for bug detection using parfait: invited talk
The goal of the Parfait project is to find bugs in C source code in a scalable and precise way. To this end, Parfait was designed as a framework with layers of sound program anal...
Cristina Cifuentes, Nathan Keynes, Lian Li, Bernha...
NDSS
2008
IEEE
14 years 4 months ago
Impeding Malware Analysis Using Conditional Code Obfuscation
Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers ...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...