Sciweavers

42 search results - page 8 / 9
» Policies and Proofs for Code Auditing
Sort
View
ESOP
2001
Springer
13 years 11 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller
SBMF
2010
Springer
132views Formal Methods» more  SBMF 2010»
13 years 1 months ago
Midlet Navigation Graphs in JML
Abstract. In the context of the EU project Mobius on Proof Carrying Code for Java programs (midlets) on mobile devices, we present a way to express midlet navigation graphs in JML....
Wojciech Mostowski, Erik Poll
INFORMATIKTAGE
2007
13 years 8 months ago
Verwundbarkeiten von Web-Anwendungen
: Web-Applikationen werden heute immer wichtiger, f¨ur viele Firmen sind sie die Haupteinnahmequelle, f¨ur einige auch die Einzige. Gleichzeitig werden diese Applikationen auch i...
Christopher Holm, Christopher Schwardt
SACMAT
2006
ACM
14 years 26 days ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar
ENVSOFT
2007
126views more  ENVSOFT 2007»
13 years 6 months ago
Uncertainty and precaution in environmental management: Insights from the UPEM conference
Communication across the science-policy interface is complicated by uncertainty and ignorance associated with predictions on which to base policies. The international symposium ...
Jeroen P. van der Sluijs