Sciweavers

5843 search results - page 84 / 1169
» Software Security in Practice
Sort
View
TASE
2007
IEEE
14 years 3 months ago
Software Security
Jeannette M. Wing
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
14 years 2 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
COMPSAC
2003
IEEE
14 years 2 months ago
A Security Characterisation Framework for Trustworthy Component Based Software Systems
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
Khaled M. Khan, Jun Han