Sciweavers

20 search results - page 4 / 4
» Reasoning about Secure Interoperation Using Soft Constraints
Sort
View
POPL
2012
ACM
12 years 2 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
CCS
2006
ACM
13 years 10 months ago
EXE: automatically generating inputs of death
This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input,...
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, ...
POPL
1998
ACM
13 years 11 months ago
A Type System for Java Bytecode Subroutines
Java is typically compiled into an intermediate language, JVML, that is interpreted by the Java Virtual Machine. Because mobile JVML code is not always trusted, a bytecode verifi...
Raymie Stata, Martín Abadi
ACSAC
2007
IEEE
14 years 1 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
IROS
2006
IEEE
116views Robotics» more  IROS 2006»
14 years 22 days ago
On the Importance of Asymmetries in Grasp Quality Metrics for Tendon Driven Hands
Abstract— Grasp quality measures are important for understanding how to plan for and maintain appropriate and secure grasps for pick and place operations and tool use. Most grasp...
Jiaxin L. Fu, Nancy S. Pollard