Sciweavers

696 search results - page 24 / 140
» Isolated Program Execution: An Application Transparent Appro...
Sort
View
AICT
2006
IEEE
128views Communications» more  AICT 2006»
14 years 1 months ago
Development of SOA-Based Software Systems - an Evolutionary Programming Approach
A software application has strong relationships with the business processes it supports. In the analysis phase those parts of the processes in which the software system is applied...
Christian Emig, Jochen Weisser, Sebastian Abeck
HPCA
2003
IEEE
14 years 7 months ago
Caches and Hash Trees for Efficient Memory Integrity
We study the hardware cost of implementing hash-tree based verification of untrusted external memory by a high performance processor. This verification could enable applications s...
Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, M...
POPL
2000
ACM
13 years 11 months ago
Resource Bound Certification
Various code certification systems allow the certification and static verification of important safety properties such as memory and control-flow safety. These systems are valuabl...
Karl Crary, Stephanie Weirich
CODES
2006
IEEE
13 years 9 months ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
ICSM
2008
IEEE
14 years 1 months ago
Identifying the root causes of memory bugs using corrupted memory location suppression
We present a general approach for automatically isolating the root causes of memory-related bugs in software. Our approach is based on the observation that most memory bugs involv...
Dennis Jeffrey, Neelam Gupta, Rajiv Gupta