Sciweavers

2236 search results - page 18 / 448
» Secure Software Design in Practice
Sort
View
WORM
2003
13 years 8 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
TRUST
2010
Springer
13 years 5 months ago
The PUF Promise
Physical Uncloneable Functions (PUF) are systems whose physical behavior to different inputs can be measured reliably, yet cannot be cloned in a physical replica. Existing designs ...
Heike Busch, Miroslava Sotáková, Ste...
IEEEARES
2008
IEEE
14 years 1 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto
CCS
2009
ACM
14 years 2 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
COMPSAC
2008
IEEE
14 years 1 months ago
Safety in Automotive Software: An Overview of Current Practices
Electronic control units and on-board networks for automotive applications cover a big variety of functions that in many cases are responsible of safetycritical behavior of the ve...
Paolo Panaroni, Giovanni Sartori, Fabrizio Fabbrin...