Sciweavers

427 search results - page 22 / 86
» Improving software security with a C pointer analysis
Sort
View
RE
2004
Springer
14 years 29 days ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
APSEC
2010
IEEE
13 years 2 months ago
Quantitative Analysis of Best Practices Models in the Software Domain
Organizations are adopting multiple best practices models to improve overall performance. Their objective is to capture the cumulative added value of each model into one single env...
André L. Ferreira, Ricardo Jorge Machado, M...
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
14 years 1 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
KBSE
2008
IEEE
14 years 2 months ago
Using Cluster Analysis to Improve the Design of Component Interfaces
For large software systems, interface structure has an important impact on their maintainability and build performance. For example, for complex systems written in C, recompilatio...
Rahmat Adnan, Bas Graaf, Arie van Deursen, Joost Z...
EMSOFT
2008
Springer
13 years 9 months ago
Symbolic analysis for improving simulation coverage of Simulink/Stateflow models
Aimed at verifying safety properties and improving simulation coverage for hybrid systems models of embedded control software, we propose a technique that combines numerical simul...
Rajeev Alur, Aditya Kanade, S. Ramesh, K. C. Shash...