Sciweavers

427 search results - page 24 / 86
» Improving software security with a C pointer analysis
Sort
View
ICRA
2008
IEEE
165views Robotics» more  ICRA 2008»
14 years 2 months ago
Comparison of robotic and clinical motor function improvement measures for sub-acute stroke patients
Abstract— In this paper, preliminary results in motor function improvement for four sub-acute stroke patients that underwent a hybrid robotic and traditional rehabilitation progr...
Ozkan Celik, Marcia Kilchenman O'Malley, Corwin Bo...
COMSWARE
2006
IEEE
14 years 1 months ago
Comparing lexical analysis tools for buffer overflow detection in network software
Many of the bugs in distributed software modules are security vulnerabilities, the most common and also the most exploited of which are buffer overflows and they typically arise in...
Davide Pozza, Riccardo Sisto, Luca Durante, Adrian...
PLDI
2000
ACM
13 years 11 months ago
Off-line variable substitution for scaling points-to analysis
Most compiler optimizations and software productivity tools rely on information about the effects of pointer dereferences in a program. The purpose of points-to analysis is to com...
Atanas Rountev, Satish Chandra
ASPLOS
2008
ACM
13 years 9 months ago
Archipelago: trading address space for reliability and security
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...
WWW
2004
ACM
14 years 8 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...