Výsledky vyhľadávania - "Security and privacy Software and application security"
-
1
Accounting for Missing Events in Statistical Information Leakage Analysis
ISSN: 1558-1225Vydavateľské údaje: IEEE 26.04.2025Vydané v Proceedings / International Conference on Software Engineering (26.04.2025)“…The leakage of secret information via a public channel is a critical privacy flaw in software systems. The more information is leaked per observation, the less…”
Získať plný text
Konferenčný príspevok.. -
2
Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality
ISSN: 2643-1572Vydavateľské údaje: ACM 27.10.2024Vydané v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Web applications are crucial infrastructures in the modern society, which have high demand of reliability and security. However, their frontend can be…”
Získať plný text
Konferenčný príspevok.. -
3
DeMistify: Identifying On-Device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps
ISSN: 1558-1225Vydavateľské údaje: ACM 14.04.2024Vydané v Proceedings / International Conference on Software Engineering (14.04.2024)“…) to smartphones locally, which are still subject to similar vulnerabilities on the remote clouds and servers, especially when facing the model stealing attack…”
Získať plný text
Konferenčný príspevok.. -
4
Extrapolating Coverage Rate in Greybox Fuzzing
ISSN: 1558-1225Vydavateľské údaje: ACM 14.04.2024Vydané v Proceedings / International Conference on Software Engineering (14.04.2024)“…A fuzzer can literally run forever. However, as more resources are spent, the coverage rate continuously drops, and the utility of the fuzzer declines. To…”
Získať plný text
Konferenčný príspevok.. -
5
Defining, enforcing and checking privacy policies in data-intensive applications
ISBN: 9781450357159, 1450357156Vydavateľské údaje: New York, NY, USA ACM 28.05.2018Vydané v 2018 IEEE ACM 13th International Symposium on Software Engineering for Adaptive and Self Managing Systems (SEAMS) (28.05.2018)“… that account for the privacy preferences of data subjects as well as for general privacy regulations…”
Získať plný text
Konferenčný príspevok.. -
6
Collaborative Software Exploration with Multimedia Note Taking in Virtual Reality
ISSN: 2643-7171Vydavateľské údaje: ACM 15.04.2024Vydané v Proceedings (IEEE International Conference on Program Comprehension. Online) (15.04.2024)“…) explore a subject system, while (2) persisting insights via free-hand diagrams, audio recordings, and in-visualization VR…”
Získať plný text
Konferenčný príspevok.. -
7
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
ISBN: 1627054774, 9781627054775ISSN: 2374-6777Vydavateľské údaje: New York, NY, USA Association for Computing Machinery and Morgan & Claypool 05.06.2014“…From the Preface As society rushes to digitize sensitive information and services, it is imperative that we adopt adequate security protections. However, such…”
Získať plný text
E-kniha -
8
Intrusion detection using signatures extracted from execution profiles
ISBN: 9781424437252, 1424437253Vydavateľské údaje: Washington, DC, USA IEEE Computer Society 19.05.2009Vydané v 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)“…An application based intrusion detection system is a security mechanism designed to detect malicious behavior that could compromise the security of a software…”
Získať plný text
Konferenčný príspevok.. -
9
Trust Negotiations with Customizable Anonymity
ISBN: 0769527493, 9780769527499Vydavateľské údaje: Washington, DC, USA IEEE Computer Society 18.12.2006Vydané v 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops : 18-22 December 2006 (18.12.2006)“… Consequently, we impose a stronger requirement: our negotiations should have the k-anonymity property -- the set of credentials submitted by a subject during a negotiation…”
Získať plný text
Konferenčný príspevok..

