Sciweavers

427 search results - page 20 / 86
» Improving software security with a C pointer analysis
Sort
View
EUROSPI
2005
Springer
14 years 1 months ago
Safety Methods in Software Process Improvement
Even if the application developers produce software in accordance with the customer requirements, they cannot guarantee that the software will behave in a safe way during the lifet...
Torgrim Lauritsen, Tor Stålhane
FCCM
2007
IEEE
146views VLSI» more  FCCM 2007»
14 years 1 months ago
Mitrion-C Application Development on SGI Altix 350/RC100
This paper provides an evaluation of SGI® RASC™ RC100 technology from a computational science software developer’s perspective. A brute force implementation of a two-point an...
Volodymyr V. Kindratenko, Robert J. Brunner, Adam ...
IACR
2011
192views more  IACR 2011»
12 years 7 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Light-weight context recovery for efficient and accurate program analyses
To compute accurate information efficiently for programs that use pointer variables, a program analysis must account for the fact that a procedure may access different sets of mem...
Donglin Liang, Mary Jean Harrold
ESORICS
2004
Springer
14 years 1 months ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...