Sciweavers

391 search results - page 33 / 79
» On Time-Aware Instrumentation of Programs
Sort
View
156
Voted
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
15 years 9 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
143
Voted
ECOOP
2003
Springer
15 years 9 months ago
Open APIs for Embedded Security
Abstract. Embedded computer control is increasingly common in appliances, vehicles, communication devices, medical instruments, and many other systems. Some embedded computer syste...
Carl A. Gunter
130
Voted
ICRA
2002
IEEE
96views Robotics» more  ICRA 2002»
15 years 8 months ago
A Suite of Tools for Debugging Distributed Autonomous Systems
This paper describes a set of tools that allows a developer to instrument an autonomous control system to log data at run-time and then analyze that data to verify correct program...
David Kortenkamp, Reid G. Simmons, Tod Milam, Joaq...
141
Voted
POPL
2000
ACM
15 years 8 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
181
Voted
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
14 years 10 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...