Sciweavers

8503 search results - page 88 / 1701
» Secure Software Architectures
Sort
View
FIW
2009
120views Communications» more  FIW 2009»
13 years 6 months ago
Software Security Vulnerabilities Seen As Feature Interactions
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
Guy-Vincent Jourdan
DSN
2007
IEEE
14 years 25 days ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ICSM
2002
IEEE
14 years 1 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
ICECCS
1998
IEEE
123views Hardware» more  ICECCS 1998»
14 years 1 months ago
Applying Slicing Technique to Software Architectures
Software architecture is receiving increasingly attention as a critical design level for software systems. As software architecture design resources (in the form of architectural ...
Jianjun Zhao
SDMW
2007
Springer
14 years 3 months ago
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems
Martin Boldt, Bengt Carlsson, Tobias Larsson, Nikl...