Sciweavers

8623 search results - page 191 / 1725
» Software engineering for secure systems
Sort
View
TRUST
2010
Springer
14 years 2 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 5 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
POPL
2008
ACM
14 years 10 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
ICSM
2006
IEEE
14 years 3 months ago
Software Assurance During Maintenance
Software development, testing, and maintenance tools must yield assurance information in a standardized form. Developers can use this information to argue that the software is ade...
Paul E. Black
AMAST
2008
Springer
13 years 11 months ago
Constant Complements, Reversibility and Universal View Updates
The algebraic specification of information systems (including
Michael Johnson, Robert D. Rosebrugh