Sciweavers

2257 search results - page 224 / 452
» Secure program partitioning
Sort
View
CSFW
2010
IEEE
14 years 2 months ago
Required Information Release
Abstract—Many computer systems have a functional requirement to release information. Such requirements are an important part of a system’s information security requirements. Cu...
Stephen Chong
ASPLOS
2012
ACM
12 years 6 months ago
Path-exploration lifting: hi-fi tests for lo-fi emulators
Processor emulators are widely used to provide isolation and instrumentation of binary software. However they have proved difficult to implement correctly: processor specificati...
Lorenzo Martignoni, Stephen McCamant, Pongsin Poos...
ACSAC
2006
IEEE
14 years 4 months ago
NetSpy: Automatic Generation of Spyware Signatures for NIDS
We present NetSpy, a tool to automatically generate network-level signatures for spyware. NetSpy determines whether an untrusted program is spyware by correlating user input with ...
Hao Wang, Somesh Jha, Vinod Ganapathy
OOPSLA
1999
Springer
14 years 3 months ago
Reducing Transfer Delay Using Java Class File Splitting and Prefetching
The proliferation of the Internet is fueling the development of mobile computing environments in which mobile code is executed on remote sites. In such environments, the end user ...
Chandra Krintz, Brad Calder, Urs Hölzle
ESORICS
2010
Springer
13 years 12 months ago
On Bounding Problems of Quantitative Information Flow
Abstract. Researchers have proposed formal definitions of quantitative information flow based on information theoretic notions such as the Shannon entropy, the min entropy, the gue...
Hirotoshi Yasuoka, Tachio Terauchi