Sciweavers

2236 search results - page 37 / 448
» Secure Software Design in Practice
Sort
View
SIES
2009
IEEE
14 years 3 months ago
A flexible design flow for software IP binding in commodity FPGA
— Software intellectual property (SWIP) is a critical component of increasingly complex FPGA based system on chip (SOC) designs. As a result, developers want to ensure that their...
Michael Gora, Abhranil Maiti, Patrick Schaumont
ISPEC
2005
Springer
14 years 2 months ago
An Open Approach for Designing Secure Electronic Immobilizers
Abstract. The automotive industry has developed electronic immobilizers to reduce the number of car thefts since the mid nineties. However, there is not much information on the cur...
Kerstin Lemke, Ahmad-Reza Sadeghi, Christian St&uu...
CCS
2003
ACM
14 years 1 months ago
MECA: an extensible, expressive system and language for statically checking security properties
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for checking real systems. It provides a variety of pract...
Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. ...
FUIN
2008
82views more  FUIN 2008»
13 years 8 months ago
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme
We introduce Nuovo DRM, a digital rights management scheme aimed to provide formal and practical security. The scheme is based on a recent DRM scheme, which we formally specify in ...
Muhammad Torabi Dashti, Srijith Krishnan Nair, Hug...
CHI
2010
ACM
14 years 3 months ago
Investigating user account control practices
Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection. UAC in Windows V...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov