Sciweavers

127 search results - page 14 / 26
» Quantifying information leaks in software
Sort
View
147
Voted
ICSEA
2007
IEEE
15 years 10 months ago
The Knowledge Based Software Process Improvement Program: A Rational Analysis
Knowledge management is the key area of focus in the present information technology scenario. It forms a basis to derive standards and models and steers organizations through an e...
K. Alagarsamy, S. Justus, K. Iyakutti
167
Voted
EDCC
2008
Springer
15 years 5 months ago
Metrics for Object-Oriented Software Reliability Assessment - Application to a Flight Manager
In avionics domain, the software applications grew to millions of source lines of code representing important development expenditures. To cut the costs, the avionics suppliers ar...
Stéphanie Gaudan, Gilles Motet, Guillaume A...
120
Voted
PLDI
2012
ACM
13 years 6 months ago
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this language, well-typed programs provably leak only a bounded amount of information over time through ...
Danfeng Zhang, Aslan Askarov, Andrew C. Myers
130
Voted
CODES
2007
IEEE
15 years 10 months ago
Secure FPGA circuits using controlled placement and routing
In current Field-Programmable-Logic Architecture (FPGA) design flows, it is very hard to control the routing of submodules. It is thus very hard to make an identical copy of an ex...
Pengyuan Yu, Patrick Schaumont
132
Voted
CASES
2004
ACM
15 years 9 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...