Sciweavers

5843 search results - page 80 / 1169
» Software Security in Practice
Sort
View
124
Voted
ESORICS
2009
Springer
16 years 3 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
166
Voted
ACSAC
2010
IEEE
15 years 24 days ago
G-Free: defeating return-oriented programming through gadget-less binaries
Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still repr...
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide...
ACSAC
2000
IEEE
15 years 7 months ago
Experience with Software Watermarking
Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di M...
115
Voted
LICS
2006
IEEE
15 years 8 months ago
Provable Implementations of Security Protocols
for reasoning about abstract models of protocols. The work on informal methods attempts to discern common patterns in the extensive record of flawed protocols, and to formulate po...
Andrew D. Gordon
108
Voted
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 6 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...