Sciweavers

276 search results - page 29 / 56
» Software Security Checklist for the Software Life Cycle
Sort
View
KBSE
2010
IEEE
13 years 7 months ago
Reducing estimation uncertainty with continuous assessment: tracking the "cone of uncertainty"
Accurate software cost and schedule estimations are essential especially for large software projects. However, once the required efforts have been estimated, little is done to rec...
Pongtip Aroonvatanaporn, Chatchai Sinthop, Barry W...
IEEESP
2006
108views more  IEEESP 2006»
13 years 9 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
SIGOPS
2011
215views Hardware» more  SIGOPS 2011»
13 years 4 months ago
Log-based architectures: using multicore to help software behave correctly
While application performance and power-efficiency are both important, application correctness is even more important. In other words, if the application is misbehaving, it is li...
Shimin Chen, Phillip B. Gibbons, Michael Kozuch, T...
ICISC
2009
132views Cryptology» more  ICISC 2009»
13 years 6 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 9 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik