Sciweavers

121 search results - page 9 / 25
» Software Protection through Anti-Debugging
Sort
View
ICST
2011
IEEE
12 years 11 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
EUSAI
2007
Springer
14 years 2 months ago
Evaluating Confidence in Context for Context-Aware Security
We propose a software framework that augments context data with a range of assorted confidence/reputation metadata for dimensions such as security, privacy, safety, reliability, or...
Marc Lacoste, Gilles Privat, Fano Ramparany
WS
2006
ACM
14 years 1 months ago
SCUBA: Secure Code Update By Attestation in sensor networks
This paper presents SCUBA (Secure Code Update By Attestation), for detecting and recovering compromised nodes in sensor networks. The SCUBA protocol enables the design of a sensor...
Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert...
RAS
2000
135views more  RAS 2000»
13 years 7 months ago
Development of the ring sensor for healthcare automation
This paper presents the development of a miniaturized telemetered ambulatory monitoring device in a ring configuration. The device, called ring sensor, is worn by the patient at a...
Boo-Ho Yang, Sokwoo Rhee
MTA
2011
203views Hardware» more  MTA 2011»
13 years 2 months ago
Interoperable digital rights management based on the MPEG Extensible Middleware
Abstract This paper describes an interoperable Digital Rights Management architecture promoted by the MPEG standardization group in its new standard known as MPEG-M or MPEG Extensi...
Víctor Rodríguez-Doncel, Jaime Delga...