Sciweavers

576 search results - page 71 / 116
» Implementing a secure setuid program
Sort
View
ICSE
2009
IEEE-ACM
14 years 4 months ago
Semantics-based code search
Our goal is to use the vast repositories of available open source code to generate specific functions or classes that meet a user’s specifications. The key words here are spec...
Steven P. Reiss
IFIP
2007
Springer
14 years 3 months ago
A Door Access Control System with Mobile Phones
Abstract. This paper proposes a door access control system with mobile phones which allows off-line delegations of an access. A model of door access control with mobile phones is ...
Tomomi Yamasaki, Toru Nakamura, Kensuke Baba, Hiro...
OOPSLA
2004
Springer
14 years 3 months ago
Advancements in multicode optimization
In previous work, we have shown that multicodes can be used to improve the performance of Java applications. We extend that work by both implementing more multicodes and consideri...
Ben Stephenson, Wade Holst
CASCON
2006
149views Education» more  CASCON 2006»
13 years 11 months ago
Packet decoding using context sensitive parsing
Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of t...
Sylvain Marquis, Thomas R. Dean, Scott Knight
ICISC
2004
122views Cryptology» more  ICISC 2004»
13 years 11 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...