Zobrazeno 1 - 10
of 74
pro vyhledávání: '"Paul E. Black"'
Autor:
Wesley Dingman, Aviel Cohen, Nick Ferrara, Adam Lynch, Patrick Jasinski, Paul E. Black, Lin Deng
Publikováno v:
International Journal of Networked and Distributed Computing (IJNDC) (null)
Rising to popularity in the last decade, blockchain technology has become the preferred platform for the transfer of digital currency. Unfortunately, many of these environments are rife with vulnerabilities exploited by financially motivated attacker
Externí odkaz:
https://doaj.org/article/7c4cd1d0776f4ce38feee47ee0ea1afc
Publikováno v:
IT Professional. 23:9-15
In the early days of computer science, the community settled on a simple standard model of computing and a basic canon of general purpose algorithms and data structures suited to that model. With isochronous computing, heterogeneous multiprocessors,
Executive Order (EO) 14028, "Improving the Nation's Cybersecurity," 12 May 2021, directs the National Institute of Standards and Technology (NIST) to recommend minimum standards for software testing within 60 days. This document describes eleven reco
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bbf77a7d1f97380085f4eb0d1b449c0b
https://doi.org/10.6028/nist.ir.8397
https://doi.org/10.6028/nist.ir.8397
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783030801250
This paper examines blockchain smart contract software assurance through the lens of static analysis. Smart contracts are immutable. Once they are deployed, it is impossible to patch or redevelop the smart contracts on active chains. This paper explo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ca5326729769578c379f95f0e7928a1e
https://doi.org/10.1007/978-3-030-80126-7_62
https://doi.org/10.1007/978-3-030-80126-7_62
Autor:
Monika Singh, Paul E. Black
Publikováno v:
Computer. 52(12)
We introduce opaque wrappers to prevent attackers from exploiting software bugs, but we find no way to implement them.
Autor:
Paul E. Black, Irena Bojanova
Publikováno v:
IT Professional. 18:58-61
The C programming language was invented more than 40 years ago. It is infamous for buffer overflows. We have learned a lot about computer science, language design, and software engineering since then. Because it is unlikely that we will stop using C
Publikováno v:
COMPSAC (1)
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)
Exposure of sensitive information can be harmful on its own. In addition, it could enable further attacks. A rigorous and unambiguous definition of information exposur
Exposure of sensitive information can be harmful on its own. In addition, it could enable further attacks. A rigorous and unambiguous definition of information exposur