Sciweavers

2257 search results - page 40 / 452
» Secure program partitioning
Sort
View
HIPC
1999
Springer
14 years 1 months ago
Microcaches
We describe a radically new cache architecture and demonstrate that it offers a huge reduction in cache cost, size and power consumption whilst maintaining performance on a wide ra...
David May, Dan Page, James Irwin, Henk L. Muller
LOGCOM
2010
154views more  LOGCOM 2010»
13 years 3 months ago
Collaborative Runtime Verification with Tracematches
Perfect pre-deployment test coverage is notoriously difficult to achieve for large applications. Given enough end users, however, many more test cases will be encountered during a...
Eric Bodden, Laurie J. Hendren, Patrick Lam, Ondre...
CSFW
2007
IEEE
14 years 19 days ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ACSD
2009
IEEE
92views Hardware» more  ACSD 2009»
14 years 3 months ago
Desynchronizing Synchronous Programs by Modes
The synchronous programming paradigm simplifies the specification and verification of reactive systems. However, synchronous programs must be often implemented on architectures...
Jens Brandt, Mike Gemunde, Klaus Schneider
ACSAC
2007
IEEE
14 years 3 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...