Sciweavers

105 search results - page 12 / 21
» Towards Mature Measurement Programs
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 9 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
ITICSE
2000
ACM
15 years 8 months ago
Has our curriculum become math-phobic? (an American perspective)
We are concerned about a view in undergraduate computer science education, especially in the early courses, that it’s okay to be math-phobic and still prepare oneself to become ...
Charles Kelemen, Allen B. Tucker, Peter Henderson,...
118
Voted
CCS
2007
ACM
15 years 10 months ago
An inquiry into the nature and causes of the wealth of internet miscreants
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...
135
Voted
VSTTE
2005
Springer
15 years 9 months ago
It Is Time to Mechanize Programming Language Metatheory
How close are we to a world in which mechanically verified software is commonplace? A world in which theorem proving technology is used routinely by both software developers and p...
Benjamin C. Pierce, Peter Sewell, Stephanie Weiric...
160
Voted
EMSOFT
2005
Springer
15 years 9 months ago
High-level real-time programming in Java
Real-time systems have reached a level of complexity beyond the scaling capability of the low-level or restricted languages traditionally used for real-time programming. While Met...
David F. Bacon, Perry Cheng, David Grove, Michael ...