Sciweavers

252 search results - page 50 / 51
» Protecting Software Code by Guards
Sort
View
126
Voted
ESOP
2005
Springer
15 years 8 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
141
Voted
ICRA
1994
IEEE
236views Robotics» more  ICRA 1994»
15 years 6 months ago
Neptune: Above-Ground Storage Tank Inspection Robot System
act The Neptune system is a mobile robot system used to remotely inspect above-ground storage tanks (ASTs) while immersed in the petroleum product, in order to ascertain from the i...
Hagen Schempf
142
Voted
DSN
2007
IEEE
15 years 6 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
148
Voted
DSN
2006
IEEE
15 years 6 months ago
Efficiently Detecting All Dangling Pointer Uses in Production Servers
In this paper, we propose a novel technique to detect all dangling pointer uses at run-time that is efficient enough for production use in server codes. One idea (previously used ...
Dinakar Dhurjati, Vikram S. Adve
112
Voted
COMGEO
1999
ACM
15 years 2 months ago
Visualizing geometric algorithms over the Web
The visual nature of geometry applications makes them a natural area where visualization can be an effective tool for demonstrating algorithms. In this paper we propose a new mode...
James E. Baker, Isabel F. Cruz, Giuseppe Liotta, R...