Sciweavers

2056 search results - page 298 / 412
» Software Architectural Design Meets Security Engineering
Sort
View
CC
2003
Springer
102views System Software» more  CC 2003»
14 years 2 months ago
Precision in Practice: A Type-Preserving Java Compiler
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
Christopher League, Zhong Shao, Valery Trifonov
CCS
2010
ACM
13 years 5 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
JCS
2002
115views more  JCS 2002»
13 years 8 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
COMPSAC
2007
IEEE
14 years 3 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...
ATAL
2005
Springer
14 years 2 months ago
AmbieAgents: a scalable infrastructure for mobile and context-aware information services
Context-aware information systems for mobile users have to cope with a variety of requirements in order to be able to provide an added value that goes beyond simply location-based...
Till Christopher Lech, Leendert W. M. Wienhofen