Sciweavers

4731 search results - page 43 / 947
» Securing Interactive Programs
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
NORDICHI
2006
ACM
14 years 2 months ago
Comparing voice chat and text chat in a communication tool for interactive television
Talking during the course of a television program is
David Geerts
IUI
2004
ACM
14 years 2 months ago
Flexible interface migration
The goal of this work is to provide users immersed in a multi-platform environment with the possibility of interacting with an application while freely moving from one device to a...
Renata Bandelloni, Fabio Paternò
PLDI
2009
ACM
14 years 3 months ago
Language-based security on Android
In this paper, we initiate a formal study of security on Android: Google’s new open-source platform for mobile devices. Specifically, we present a core typed language to descri...
Avik Chaudhuri
FASE
2009
Springer
14 years 3 months ago
A Formal Connection between Security Automata and JML Annotations
Security automata are a convenient way to describe security policies. Their typical use is to monitor the execution of an application, and to interrupt it as soon as the security p...
Marieke Huisman, Alejandro Tamalet