Sciweavers

420 search results - page 55 / 84
» Using static analysis for Ajax intrusion detection
Sort
View
IEEEARES
2008
IEEE
14 years 1 months ago
Type and Effect Annotations for Safe Memory Access in C
In this paper, we present a novel type and effect analysis for detecting memory errors in C source code. We extend the standard C type system with effect, region, and host annotat...
Syrine Tlili, Mourad Debbabi
AIM
2002
13 years 7 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
IANDC
2008
140views more  IANDC 2008»
13 years 7 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
PASTE
2005
ACM
14 years 1 months ago
An empirical framework for comparing effectiveness of testing and property-based formal analysis
Today, many formal analysis tools are not only used to provide certainty but are also used to debug software systems – a role that has traditional been reserved for testing tool...
Jeremy S. Bradbury, James R. Cordy, Jürgen Di...
CVPR
2000
IEEE
13 years 12 months ago
Error Analysis of Background Adaption
Background modeling is a common component in video surveillance systems and is used to quickly identify regions of interest. To increase the robustness of background subtraction t...
Xiang Gao, Terrance E. Boult, Frans Coetzee, Visva...