Sciweavers

201 search results - page 27 / 41
» Security Properties of Typed Applets
Sort
View
108
Voted
TGC
2007
Springer
15 years 9 months ago
Adversaries and Information Leaks (Tutorial)
Secure information flow analysis aims to prevent programs from leaking their H (high) inputs to their L (low) outputs. A major challenge in this area is to relax the standard noni...
Geoffrey Smith
130
Voted
CMS
2006
127views Communications» more  CMS 2006»
15 years 4 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
OOPSLA
1989
Springer
15 years 7 months ago
Virtual Classes: A Powerful Mechanism in Object-Oriented Programming
The notions of class, subclass and virtual procedure are fairly well understood and recognized as some of the key concepts in object-oriented programming. The possibility of modif...
Ole Lehrmann Madsen, Birger Møller-Pedersen
DRM
2005
Springer
15 years 9 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
ICALP
2003
Springer
15 years 8 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...