Sciweavers

5843 search results - page 45 / 1169
» Software Security in Practice
Sort
View
72
Voted
CCS
2010
ACM
15 years 2 months ago
Survivable key compromise in software update systems
Justin Samuel, Nick Mathewson, Justin Cappos, Roge...
117
Voted
ACSAC
2010
IEEE
14 years 11 months ago
SCOBA: source code based attestation on custom software
Liang Gu, Yao Guo, Anbang Ruan, Qingni Shen, Hong ...
108
Voted
DRMTICS
2005
Springer
15 years 8 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov
USS
2008
15 years 5 months ago
Experiences with Model Inference Assisted Fuzzing
In this paper we introduce the idea of model inference assisted fuzzing aimed to cost effectively improve software security. We experimented with several model inference technique...
Joachim Viide, Aki Helin, Marko Laakso, Pekka Piet...
137
Voted
CCS
2010
ACM
15 years 2 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...