Sciweavers

67 search results - page 9 / 14
» Security metrics for source code structures
Sort
View
COMPSAC
2009
IEEE
14 years 1 months ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...
MICCAI
2003
Springer
14 years 7 months ago
A Statistically Based Surface Evolution Method for Medical Image Segmentation: Presentation and Validation
Abstract. In this paper we present a new algorithm for 3D medical image segmentation. The algorithm is fast, relatively simple to implement, and semi-automatic. It is based on mini...
Eric Pichon, Allen Tannenbaum, Ron Kikinis
APLAS
2010
ACM
13 years 7 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
PLDI
2009
ACM
14 years 1 months ago
Binary analysis for measurement and attribution of program performance
Modern programs frequently employ sophisticated modular designs. As a result, performance problems cannot be identified from costs attributed to routines in isolation; understand...
Nathan R. Tallent, John M. Mellor-Crummey, Michael...
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
14 years 1 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron