software security

Results: 17991



#Item
1Detection of Security Vulnerabilities in C Code using Runtime Verification: an Experience Report Kostyantyn Vorobyov, Nikolai Kosmatov, and Julien Signoles CEA, LIST, Software Reliability and Security Laboratory, PC 174,

Detection of Security Vulnerabilities in C Code using Runtime Verification: an Experience Report Kostyantyn Vorobyov, Nikolai Kosmatov, and Julien Signoles CEA, LIST, Software Reliability and Security Laboratory, PC 174,

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2018-06-20 05:46:32
2Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France  CEA LIST, Software Reliability and Security Laborator

Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France CEA LIST, Software Reliability and Security Laborator

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-09-15 19:04:15
3Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu  Ab

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 06:12:20
4DIMVA Dear Prospective Sponsor. Since 2004 and 2009 the annual international IT-Security conferences DIMVA (Detection of Intrusions and Malware & Vulnerability Assessment) and ESSOS (Engineering Secure Software and Syste

DIMVA Dear Prospective Sponsor. Since 2004 and 2009 the annual international IT-Security conferences DIMVA (Detection of Intrusions and Malware & Vulnerability Assessment) and ESSOS (Engineering Secure Software and Syste

Add to Reading List

Source URL: itsec.cs.uni-bonn.de

Language: English - Date: 2017-04-24 03:56:14
5Runtime Detection of Temporal Memory Errors? Kostyantyn Vorobyov, Nikolai Kosmatov, Julien Signoles, and Arvid Jakobsson CEA, LIST, Software Reliability and Security Laboratory, PC 174, 91191 Gif-sur-Yvette France {kosty

Runtime Detection of Temporal Memory Errors? Kostyantyn Vorobyov, Nikolai Kosmatov, Julien Signoles, and Arvid Jakobsson CEA, LIST, Software Reliability and Security Laboratory, PC 174, 91191 Gif-sur-Yvette France {kosty

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-09-15 19:04:17
6Contrast Security Announces Microsoft Ventures and AXA Strategic Ventures as Global Strategic Investors Investments signal criticality of securing software applications in the Cloud and DevOps Los Altos, Calif. — Decem

Contrast Security Announces Microsoft Ventures and AXA Strategic Ventures as Global Strategic Investors Investments signal criticality of securing software applications in the Cloud and DevOps Los Altos, Calif. — Decem

Add to Reading List

Source URL: www.axavp.com

Language: English - Date: 2018-04-06 05:48:02
7Real Behavior of Floating Point Numbers  * Bruno Marre1 , Fran¸cois Bobot1 , and Zakaria Chihani1 CEA LIST, Software Security Lab, Gif-sur-Yvette, France

Real Behavior of Floating Point Numbers * Bruno Marre1 , Fran¸cois Bobot1 , and Zakaria Chihani1 CEA LIST, Software Security Lab, Gif-sur-Yvette, France

Add to Reading List

Source URL: smt-workshop.cs.uiowa.edu

Language: English - Date: 2017-09-02 14:08:49
8Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 15:46:40
9A Clairvoyant Approach to Evaluating Software (In)Security Bhushan Jain Chia-Che Tsai  Donald E. Porter

A Clairvoyant Approach to Evaluating Software (In)Security Bhushan Jain Chia-Che Tsai Donald E. Porter

Add to Reading List

Source URL: www.chiachetsai.com

Language: English - Date: 2018-04-07 01:30:50
    10TESTING CRYPTOGRAPHIC SECURITY IN YOUR APPLICATIONS Cryptosense provides state-of-the-art analysis software to help some of the world’s largest organizations eliminate the vulnerabilities caused by crypto misuse in the

    TESTING CRYPTOGRAPHIC SECURITY IN YOUR APPLICATIONS Cryptosense provides state-of-the-art analysis software to help some of the world’s largest organizations eliminate the vulnerabilities caused by crypto misuse in the

    Add to Reading List

    Source URL: cryptosense.com

    Language: English - Date: 2017-10-03 09:47:46