Sciweavers

121 search results - page 12 / 25
» Software Protection through Anti-Debugging
Sort
View
WIAS
2010
102views more  WIAS 2010»
13 years 6 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
ICSE
2009
IEEE-ACM
13 years 5 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
JOC
2010
92views more  JOC 2010»
13 years 2 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
CBSE
2011
Springer
12 years 8 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
LCR
2000
Springer
172views System Software» more  LCR 2000»
13 years 11 months ago
Achieving Robust, Scalable Cluster I/O in Java
We present Tigris, a high-performance computation and I/O substrate for clusters of workstations that is implemented entirely in Java. Tigris automatically balances resource load a...
Matt Welsh, David E. Culler