Sciweavers

494 search results - page 83 / 99
» Static Analysis for Guarded Code
Sort
View
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
14 years 1 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
IPPS
2007
IEEE
14 years 1 months ago
POET: Parameterized Optimizations for Empirical Tuning
The excessive complexity of both machine architectures and applications have made it difficult for compilers to statically model and predict application behavior. This observatio...
Qing Yi, Keith Seymour, Haihang You, Richard W. Vu...
RAID
2007
Springer
14 years 1 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
ISSRE
2006
IEEE
14 years 1 months ago
Call Stack Coverage for GUI Test-Suite Reduction
—Graphical user interfaces (GUIs) are used as front ends to most of today’s software applications. The event-driven nature of GUIs presents new challenges for testing. One impo...
Scott McMaster, Atif M. Memon
CSFW
2003
IEEE
14 years 25 days ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann