Sciweavers

84 search results - page 14 / 17
» Improvements to the Implementation of Interpolant-Based Mode...
Sort
View
ACSAC
2006
IEEE
14 years 5 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
14 years 11 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
ETFA
2006
IEEE
14 years 2 months ago
Verification of The Minimum Cost Forwarding Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) consist of small self-contained devices with computational, sensing and wireless communication capabilities. They allow flexible, powerful, tetherles...
William D. Henderson, Steven Tron
DAC
2009
ACM
14 years 12 months ago
Computing bounds for fault tolerance using formal techniques
Continuously shrinking feature sizes result in an increasing susceptibility of circuits to transient faults, e.g. due to environmental radiation. Approaches to implement fault tol...
André Sülflow, Görschwin Fey, Rol...
WECWIS
2005
IEEE
140views ECommerce» more  WECWIS 2005»
14 years 4 months ago
Developing Flexible Service Portals
Flexible workflow systems are needed for processes that need consistency as well as flexibility (e.g., personalized client interactions). A methodology for designing flexible serv...
Beat Liver, Jeannette Braun, Beatrix Rentsch, Pete...