Sciweavers

283 search results - page 11 / 57
» Software Inspections We Can Trust
Sort
View
IEEEARES
2010
IEEE
14 years 4 months ago
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
—Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In ...
Takamasa Isohara, Keisuke Takemori, Yutaka Miyake,...
DATE
2004
IEEE
139views Hardware» more  DATE 2004»
14 years 2 months ago
Flexible Software Protection Using Hardware/Software Codesign Techniques
A strong level of trust in the software running on an embedded processor is a prerequisite for its widespread deployment in any high-risk system. The expanding field of software p...
Joseph Zambreno, Alok N. Choudhary, Rahul Simha, B...
ATC
2009
Springer
14 years 2 months ago
SAConf: Semantic Attestation of Software Configurations
Remote attestation is one of the key functionalities provided by trusted platforms. Most current attestation approaches are based on cryptographic hash functions, which are appropr...
Hua Wang, Yao Guo, Xiangqun Chen
IWPC
2010
IEEE
13 years 9 months ago
CheckDep: A Tool for Tracking Software Dependencies
Many software developers use a syntactical ‘diff’ in order to perform a quick review before committing changes to the repository. Others are notified of the change by email (...
Dirk Beyer, Ashgan Fararooy
CASSIS
2004
Springer
14 years 4 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann