Sciweavers

1282 search results - page 156 / 257
» Practical Loss-Resilient Codes
Sort
View
ISW
2009
Springer
14 years 4 months ago
Nonce Generators and the Nonce Reset Problem
A nonce is a cryptographic input value which must never repeat within a given context. Nonces are important for the security of many cryptographic building blocks, such as stream c...
Erik Zenner
IEEEARES
2008
IEEE
14 years 4 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto
SP
2008
IEEE
14 years 4 months ago
Preventing Memory Error Exploits with WIT
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
Periklis Akritidis, Cristian Cadar, Costin Raiciu,...
ICSM
2007
IEEE
14 years 4 months ago
The Social Context of Software Maintenance
Software maintenance is a highly collaborative activity whose social context is rarely addressed. To explore this context, we conducted an ethnographic study at a large technology...
Jonathan Sillito, Eleanor Wynn
KBSE
2007
IEEE
14 years 4 months ago
Automated detection of api refactorings in libraries
Software developers often do not build software from scratch but reuse software libraries. In theory, the APIs of a library should be stable, but in practice they do change and th...
Kunal Taneja, Danny Dig, Tao Xie