Zobrazeno 1 - 10
of 198
pro vyhledávání: '"Miller, Barton P"'
Autor:
Vavrek, Jayson R, Zhou, Luozhong, Boverhof, Joshua, Heymann, Elisa R, Miller, Barton P, Peisert, Sean
In future nuclear arms control treaties, it will be necessary to authenticate the hardware and software components of verification measurement systems, i.e., to ensure these systems are functioning as intended and have not been tampered with by malic
Externí odkaz:
http://arxiv.org/abs/2404.05946
Several studies showed that misuses of cryptographic APIs are common in real-world code (e.g., Apache projects and Android apps). There exist several open-sourced and commercial security tools that automatically screen Java programs to detect misuses
Externí odkaz:
http://arxiv.org/abs/2112.04037
Publikováno v:
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2021
As fuzz testing has passed its 30th anniversary, and in the face of the incredible progress in fuzz testing techniques and tools, the question arises if the classic, basic fuzz technique is still useful and applicable? In that tradition, we have upda
Externí odkaz:
http://arxiv.org/abs/2008.06537
Attacks on software systems occur world-wide on a daily basis targeting individuals, corporations, and governments alike. The systems that facilitate maritime shipping are at risk of serious disruptions, and these disruptions can stem from vulnerabil
Externí odkaz:
http://arxiv.org/abs/2006.12056
Autor:
Meng, Xiaozhu, Anderson, Jonathon M., Mellor-Crummey, John, Krentel, Mark W., Miller, Barton P., Milaković, Srđan
Binary code analysis is widely used to assess a program's correctness, performance, and provenance. Binary analysis applications often construct control flow graphs, analyze data flow, and use debugging information to understand how machine code rela
Externí odkaz:
http://arxiv.org/abs/2001.10621
Autor:
Adams, Andrew, Avila, Kay, Basney, Jim, Brunson, Dana, Cowles, Robert, Dopheide, Jeannette, Fleury, Terry, Heymann, Elisa, Hudson, Florence, Jackson, Craig, Kiser, Ryan, Krenz, Mark, Marsteller, Jim, Miller, Barton P., Peisert, Sean, Russell, Scott, Sons, Susan, Welch, Von, Zage, John
This article describes experiences and lessons learned from the Trusted CI project, funded by the US National Science Foundation to serve the community as the NSF Cybersecurity Center of Excellence. Trusted CI is an effort to address cybersecurity fo
Externí odkaz:
http://arxiv.org/abs/1904.05383
Binary code authorship identification determines authors of a binary program. Existing techniques have used supervised machine learning for this task. In this paper, we look this problem from an attacker's perspective. We aim to modify a test binary,
Externí odkaz:
http://arxiv.org/abs/1809.08316
Autor:
Heymann, Elisa, Miller, Barton P., Adams, Andrew, Avila, Kay, Krenz , Mark, Lee, Jason R., Peisert, Sean
In 2021, Trusted CI is conducting our focused "annual challenge" on the security (sometimes called "assurance") of software used by scientific computing and cyberinfrastructure. The goal of this year-long project, involving seven Trusted CI members,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7c8966f7d6acced455ab6b61123bd53a
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.