Security Analysis

Results: 6956



#Item
1

Securify: Practical Security Analysis of Smart Contracts Petar Tsankov Andrei Dan Dana Drachsler-Cohen

Add to Reading List

Source URL: files.sri.inf.ethz.ch

Language: English - Date: 2018-09-05 10:55:59
    2Software engineering / Computer programming / Computing / Object-oriented programming languages / KeY / Symbolic execution / Thread / LLVM / Parallel computing / D / Concolic testing

    Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-30 18:44:12
    3Computer security / Computing / Computer network security / Security engineering / Information and communications technology / Crime prevention / Cryptography / National security / Virtual private network / SCADA / FBI Criminal Justice Information Services Division / Computer network

    A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman

    Add to Reading List

    Source URL: benvds.com

    Language: English - Date: 2018-09-18 11:06:16
    4Cryptography / Computing / Internet / Internet Standards / Internet protocols / Cryptographic protocols / E-commerce / Public-key cryptography / Transport Layer Security / Hostname / X.509 / Public key certificate

    HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:27
    5Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

    Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 08:13:56
    6Computing / Software engineering / Data types / Computer programming / Primitive types / Formal languages / Formal methods / ANSI/ISO C Specification Language / C / String / Frama-C / Permutation

    Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France CEA LIST, Software Reliability and Security Laborator

    Add to Reading List

    Source URL: julien.signoles.free.fr

    Language: English - Date: 2017-09-15 19:04:15
    7Software engineering / Computing / Computer programming / Program analysis / Object-oriented programming languages / Frama-C / Software testing / Static program analysis / Abstract interpretation / OCaml / Type system / Formal methods

    Static Analysis and Runtime-Assertion Checking: Contribution to Security Counter-Measures Dillon Pariente1 and Julien Signoles2 1

    Add to Reading List

    Source URL: julien.signoles.free.fr

    Language: English - Date: 2017-08-11 12:57:48
    8Cryptocurrencies / Ethereum / Alternative currencies / Blockchains / Numismatics / Economy / Money / Cross-platform software / Initial coin offering / Token / Kin / Draft:Bancor protocol

    A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog

    Add to Reading List

    Source URL: hacken.io

    Language: English - Date: 2017-10-05 12:06:50
    9Cryptocurrencies / Ethereum / Alternative currencies / Blockchains / Numismatics / Economy / Money / Cross-platform software / Initial coin offering / Token / Kin / Draft:Bancor protocol

    A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog

    Add to Reading List

    Source URL: hacken.io

    Language: English - Date: 2017-10-12 11:57:40
    10Software / Computing / Free software / Web browsers / Cross-platform software / JavaScript / Web programming / Firefox / Cross-site scripting / Proxy server / Trusted computing base / Browser extension

    Improving Web Privacy And Security with a Cost-Benefit Analysis of the Web API by Peter Snyder B.A., Lawrence University, 2006

    Add to Reading List

    Source URL: www.peteresnyder.com

    Language: English - Date: 2018-06-29 22:01:44
    UPDATE