Security software

Results: 17991



#Item
961Free software / Cryptography / Software / Cloud storage / OwnCloud / Disk encryption / Cryptographic software / Key management / Encryption / Internet security / Public-key cryptography / Nextcloud

ownCloud Security and Encryption 2.0; A Technical Overview ownCloud, Inc. 57 Bedford Street, Suite 102

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-03-16 13:42:38
962Software testing / Reliability engineering / Test automation / Integration testing / Code coverage / High Efficiency Video Coding

ITL BULLETIN FOR MAY 2016 COMBINATORIAL TESTING FOR CYBERSECURITY AND RELIABILITY Rick Kuhn, Raghu Kacker, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-11 14:32:17
963Software engineering / Computer programming / Computing / Edsger W. Dijkstra / Computer security / Control-flow integrity / Subroutines / Control flow / Pointer / DynamoRIO / Goto / Stack

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer1 , Antonio Barresi2 , and Thomas R. Gross2 1 Purdue University

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
964Antivirus software / Computer network security / Content-control software / Webroot / Computer security / Endpoint security / SentinelOne / Carbon Black

ESG Brief Webroot’s Intelligent Approach to Endpoint Security Date: September 2015 Author: Doug Cahill, Senior Analyst; and Jon Oltsik, Senior Principal Analyst Abstract: The endpoint often plays a central role in the

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-02-25 11:51:28
965Computing / Software engineering / Computer programming / C standard library / Software bugs / Computer security / Memory management / Subroutines / Control-flow integrity / Call stack / Stack buffer overflow / Setjmp.h

Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley Antonio Barresi

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
966Software / Computing / System software / Hardware virtualization / Hypervisor / X86 virtualization / Virtualization / Virtual machine / VMware / Embedded hypervisor / Hardware-assisted virtualization

Machine Virtualization for Fun, Profit, and Security Muli Ben-Yehuda (Technion & IBM Research) Muli Ben-Yehuda Technion & IBM Research

Add to Reading List

Source URL: www.mulix.org

Language: English - Date: 2016-06-16 09:04:11
967Security / Computing / Information technology management / Configuration management / Network architecture / Software-defined networking / Routing / Access control / Firewall

Safe and Flexible Controller Upgrades for SDNs Karla Saur Joseph Collard

Add to Reading List

Source URL: vanbever.eu

Language: English - Date: 2016-02-21 06:07:19
968Computing / Software / Computer architecture / Smartphones / Cloud clients / Computing platforms / Mobile operating systems / Personal computing / Android / Tablet computer / Rooting / Linux

IEEE Symponsium on Security and Privacy, San Jose, CA, MayThe Peril of Fragmentation: Security Hazards in Android Device Driver Customizations Xiaoyong Zhou∗ , Yeonjoon Lee∗ , Nan Zhang∗ , Muhammad Naveed†

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-05-08 03:51:49
969Software / Computing / Computer architecture / Smartphones / Mobile operating systems / Social networking services / Android / Mobile security / Twitter / Here WeGo / IOS / Mobile deep linking

Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources Xiaoyong Zhou1 , Soteris Demetriou2 , Dongjing He2 , Muhammad Naveed2 , Xiaorui Pan1 , XiaoFeng Wang1 , Carl A. Gunter2 , Klara N

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-05-08 03:51:04
970Security / Computer security / Prevention / Cyberwarfare / Crime prevention / Cryptography / National security / Federal Information Security Management Act

Earth System Grid Federation (ESGF) Software Security Plan

Add to Reading List

Source URL: esgf.llnl.gov

Language: English - Date: 2016-06-01 13:26:15
UPDATE