Výsledky vyhledávání - "Security and privacy Software and application security Software security engineering"
-
1
Extrapolating Coverage Rate in Greybox Fuzzing
ISSN: 1558-1225Vydáno: ACM 14.04.2024Vydáno v Proceedings / International Conference on Software Engineering (14.04.2024)“…A fuzzer can literally run forever. However, as more resources are spent, the coverage rate continuously drops, and the utility of the fuzzer declines. To…”
Získat plný text
Konferenční příspěvek -
2
Accounting for Missing Events in Statistical Information Leakage Analysis
ISSN: 1558-1225Vydáno: IEEE 26.04.2025Vydáno v Proceedings / International Conference on Software Engineering (26.04.2025)“…The leakage of secret information via a public channel is a critical privacy flaw in software systems. The more information is leaked per observation, the less…”
Získat plný text
Konferenční příspěvek -
3
Intrusion detection using signatures extracted from execution profiles
ISBN: 9781424437252, 1424437253Vydáno: Washington, DC, USA IEEE Computer Society 19.05.2009Vydáno v 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)“…An application based intrusion detection system is a security mechanism designed to detect malicious behavior that could compromise the security of a software…”
Získat plný text
Konferenční příspěvek -
4
Trust Negotiations with Customizable Anonymity
ISBN: 0769527493, 9780769527499Vydáno: Washington, DC, USA IEEE Computer Society 18.12.2006Vydáno v 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops : 18-22 December 2006 (18.12.2006)“… Consequently, we impose a stronger requirement: our negotiations should have the k-anonymity property -- the set of credentials submitted by a subject during a negotiation…”
Získat plný text
Konferenční příspěvek

