Sciweavers

8623 search results - page 191 / 1725
» Software engineering for secure systems
Sort
View
107
Voted
TRUST
2010
Springer
15 years 7 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
173
Voted
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 10 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
229
Voted
POPL
2008
ACM
16 years 3 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
ICSM
2006
IEEE
15 years 8 months ago
Software Assurance During Maintenance
Software development, testing, and maintenance tools must yield assurance information in a standardized form. Developers can use this information to argue that the software is ade...
Paul E. Black
100
Voted
AMAST
2008
Springer
15 years 4 months ago
Constant Complements, Reversibility and Universal View Updates
The algebraic specification of information systems (including
Michael Johnson, Robert D. Rosebrugh