Sciweavers

576 search results - page 39 / 116
» Implementing a secure setuid program
Sort
View
OOPSLA
1999
Springer
14 years 1 months ago
Compositional Pointer and Escape Analysis for Java Programs
This paper presents a combined pointer and escape analysis algorithm for Java programs. The algorithm is based on the abstraction of points-to escape graphs, which characterize ho...
John Whaley, Martin C. Rinard
OOPSLA
2009
Springer
14 years 3 months ago
Minimizing dependencies within generic classes for faster and smaller programs
Generic classes can be used to improve performance by allowing compile-time polymorphism. But the applicability of compile-time polymorphism is narrower than that of runtime polym...
Dan Tsafrir, Robert W. Wisniewski, David F. Bacon,...
NOMS
2006
IEEE
147views Communications» more  NOMS 2006»
14 years 2 months ago
DiMAPI: An Application Programming Interface for Distributed Network Monitoring
Abstract— Network monitoring and measurement is commonly regarded as an essential function for understanding, managing and improving the performance and security of network infra...
Panos Trimintzios, Michalis Polychronakis, Antonis...
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 3 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens