Sciweavers

11603 search results - page 74 / 2321
» Securing Embedded Systems
Sort
View
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson

Publication
148views
13 years 10 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
DATE
2005
IEEE
122views Hardware» more  DATE 2005»
14 years 2 months ago
Systematic Transaction Level Modeling of Embedded Systems with SystemC
This paper gives an overview of a transaction level modeling (TLM) design flow for straightforward embedded system design with SystemC. The goal is to systematically develop both...
Wolfgang Klingauf