Sciweavers

123 search results - page 7 / 25
» Security and Source Code Access: Issues and Realities
Sort
View
SIGSOFT
2003
ACM
14 years 7 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
SIGSOFT
2003
ACM
14 years 7 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
ESSOS
2011
Springer
12 years 10 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
WORDS
2005
IEEE
14 years 9 days ago
Specification-Based Verification and Validation of Web Services and Service-Oriented Operating Systems
Service-Oriented Architecture (SOA) and Web Services (WS) have received significant attention recently. Even though WS are based on open standards and support software interoperab...
Wei-Tek Tsai, Yinong Chen, Raymond A. Paul
JPDC
2008
134views more  JPDC 2008»
13 years 6 months ago
Analyzing the performance of a cluster-based architecture for immersive visualization systems
Cluster computing has become an essential issue for designing immersive visualization systems. This paradigm employs scalable clusters of commodity computers with much lower costs...
Pedro Morillo, Aron Bierbaum, Patrick Hartling, Ma...