Sciweavers

427 search results - page 39 / 86
» Improving software security with a C pointer analysis
Sort
View
IANDC
2008
128views more  IANDC 2008»
13 years 7 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
OOPSLA
2001
Springer
14 years 3 days ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
ASPLOS
2008
ACM
13 years 9 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
ICSE
1993
IEEE-ACM
13 years 11 months ago
A Comprehensive Process Model for Studying Software Process Papers
E cient and e ective studying of scienti c papers is an important part of software engineering education. Moreover, it contributes to the knowledge necessary to carry out software...
Rudolf K. Keller, Richard Lajoie, Nazim H. Madhavj...
ICSE
2005
IEEE-ACM
14 years 7 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...