Sciweavers

1073 search results - page 3 / 215
» Secure context-sensitive authorization
Sort
View
CCS
2003
ACM
14 years 29 days ago
Buffer overrun detection using linear programming and static analysis
This paper addresses the issue of identifying buffer overrun vulnerabilities by statically analyzing C source code. We demonstrate a light-weight analysis based on modeling C stri...
Vinod Ganapathy, Somesh Jha, David Chandler, David...
ISCI
2010
105views more  ISCI 2010»
13 years 6 months ago
Secure threshold multi authority attribute based encryption without a central authority
Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
CSFW
2004
IEEE
13 years 11 months ago
By Reason and Authority: A System for Authorization of Proof-Carrying Code
We present a system, BLF, that combines an authorization logic based on the Binder language with a logical framework, LF, able to express semantic properties of programs. BLF is a...
Nathan Whitehead, Martín Abadi, George C. N...
OOPSLA
2007
Springer
14 years 1 months ago
Probabilistic calling context
Calling context enhances program understanding and dynamic analyses by providing a rich representation of program location. Compared to imperative programs, objectoriented program...
Michael D. Bond, Kathryn S. McKinley