and Security

Results: 171768



#Item
41Computing / Software engineering / Computer programming / Software bugs / Software testing / Computer network security / Debuggers / Common Weakness Enumeration / Memory debugger / Memory safety / Application security / Frama-C

Detection of Security Vulnerabilities in C Code using Runtime Verification: an Experience Report Kostyantyn Vorobyov, Nikolai Kosmatov, and Julien Signoles CEA, LIST, Software Reliability and Security Laboratory, PC 174,

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2018-06-20 05:46:32
42Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 06:46:30
43Algebra / Mathematics / Linear algebra / Matrices / Matrix theory / Abstract algebra / Coding theory / Trace / Circulant matrix / Square matrix / Matrix / Row and column spaces

Column Parity Mixers Ko Stoffelen1∗ and Joan Daemen1,2 1 Digital Security Group, Radboud University, Nijmegen, The Netherlands 2

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-03-09 10:10:48
44Finance / Economy / Money / Financial markets / Brokerage firms / Commodity markets / Broker-dealer / Fixed income / Order / Manning rule

Finra Rule 5320 Disclosure Rule 5320 generally provides that a broker-dealer that accepts and holds an order in an equity security from its own customer or customer of another broker-dealer is prohibited from trading tha

Add to Reading List

Source URL: www.traditionamericas.com

Language: English - Date: 2017-03-31 11:07:20
45Stock market / Finance / Initial public offering / 73rd United States Congress / U.S. Securities and Exchange Commission / Prospectus / Securities Act / Initial coin offering / Security / Money / Economy

BUILDING A REGULATED INVESTMENT PLATFORM AND SECURITY TOKEN EXCHANGE FOR START-UPS AND SMEs Q4 2018 Disclaimer

Add to Reading List

Source URL: kambio.io

Language: English - Date: 2018-10-18 01:47:00
46Computer security / Security engineering / Cyberwarfare / Prevention / Cybercrime / National security / Computer network security / Cyberattack / Capture the flag / Information security / Denial-of-service attack

Poster: Shell We Play A Game? CTF-as-a-service for Security Education Adam Doup´e and Giovanni Vigna Arizona State University and UC Santa Barbara ,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 00:24:26
47Computational neuroscience / Chemistry / Applied mathematics / Artificial neural networks / Phase transitions / Statistics / Scientific modeling / Design of experiments / Deep learning / Distillation / Outlier / Surrogate model

A full version of this paper is available at https://papernot.fr/files/extending-distillation.pdf Poster: Extending Defensive Distillation Nicolas Papernot and Patrick McDaniel Pennsylvania State University {ngp5056,mcd

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 02:41:14
48Computing / Software engineering / Data types / Computer programming / Primitive types / Formal languages / Formal methods / ANSI/ISO C Specification Language / C / String / Frama-C / Permutation

Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France CEA LIST, Software Reliability and Security Laborator

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-09-15 19:04:15
49Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-03 08:56:26
50Software engineering / Computing / Computer programming / Program analysis / Object-oriented programming languages / Frama-C / Software testing / Static program analysis / Abstract interpretation / OCaml / Type system / Formal methods

Static Analysis and Runtime-Assertion Checking: Contribution to Security Counter-Measures Dillon Pariente1 and Julien Signoles2 1

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-08-11 12:57:48
UPDATE