Sciweavers

87 search results - page 15 / 18
» On the Concept of Software Obfuscation in Computer Security
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
Games for extracting randomness
Randomness is a necessary ingredient in various computational tasks and especially in Cryptography, yet many existing mechanisms for obtaining randomness suffer from numerous pro...
Ran Halprin, Moni Naor
OOPSLA
2010
Springer
13 years 6 months ago
Type classes as objects and implicits
Type classes were originally developed in Haskell as a disciplined alternative to ad-hoc polymorphism. Type classes have been shown to provide a type-safe solution to important ch...
Bruno C. d. S. Oliveira, Adriaan Moors, Martin Ode...
NSPW
2006
ACM
14 years 1 months ago
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
Spyware, Adware, Bots. In each case, there is significant evidence that there is an increasing financial motivation behind the writing and distribution of these programs. In thi...
Richard Ford, Sarah Gordon
SAC
2009
ACM
14 years 2 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
KBSE
2007
IEEE
14 years 1 months ago
Extracting rights and obligations from regulations: toward a tool-supported process
Security, privacy and governance are increasingly the focus of government regulations in the U.S., Europe and elsewhere. This trend has created a “regulation compliance” probl...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...