Sciweavers

1599 search results - page 14 / 320
» Program Analysis for Security and Privacy
Sort
View
CCS
2008
ACM
13 years 9 months ago
Efficient and extensible security enforcement using dynamic data flow analysis
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
Walter Chang, Brandon Streiff, Calvin Lin
CCS
2007
ACM
14 years 1 months ago
Security policy analysis using deductive spreadsheets
Anu Singh, C. R. Ramakrishnan, I. V. Ramakrishnan,...
CSFW
2000
IEEE
13 years 12 months ago
Relating Strands and Multiset Rewriting for Security Protocol Analysis
Iliano Cervesato, Nancy A. Durgin, John C. Mitchel...
CCS
2011
ACM
12 years 7 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...