Sciweavers

1599 search results - page 15 / 320
» Program Analysis for Security and Privacy
Sort
View
OOPSLA
1999
Springer
14 years 26 days ago
Escape Analysis for Java
Jong-Deok Choi, Manish Gupta, Mauricio J. Serrano,...
CCS
2010
ACM
13 years 8 months ago
Inference and analysis of formal models of botnet command and control protocols
Chia Yuan Cho, Domagoj Babic, Eui Chul Richard Shi...
SP
2002
IEEE
132views Security Privacy» more  SP 2002»
13 years 8 months ago
Automated Generation and Analysis of Attack Graphs
Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richar...
ESORICS
2009
Springer
14 years 9 months ago
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Abstract. Diagnostic and classification algorithms play an important role in data analysis, with applications in areas such as health care, fault diagnostics, or benchmarking. Bran...
Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov...
CCS
1998
ACM
14 years 25 days ago
A Probabilistic Poly-Time Framework for Protocol Analysis
We develop a framework for analyzing security protocols in which protocol adversaries may be arbitrary probabilistic polynomial-time processes. In this framework, protocols are wr...
Patrick Lincoln, John C. Mitchell, Mark Mitchell, ...