Zobrazeno 1 - 10
of 292
pro vyhledávání: '"Schrammel, P."'
Autor:
Unterguggenberger, Martin, Lamster, Lukas, Schrammel, David, Schwarzl, Martin, Mangard, Stefan
Efficient cloud computing relies on in-process isolation to optimize performance by running workloads within a single process. Without heavy-weight process isolation, memory safety errors pose a significant security threat by allowing an adversary to
Externí odkaz:
http://arxiv.org/abs/2407.10740
The C Bounded Model Checker (CBMC) demonstrates the violation of assertions in C programs, or proves safety of the assertions under a given bound. CBMC implements a bit-precise translation of an input C program, annotated with assertions and with loo
Externí odkaz:
http://arxiv.org/abs/2302.02384
JBMC is an open-source SAT- and SMT-based bounded model checking tool for verifying Java bytecode. JBMC relies on an operational model of the Java libraries, which conservatively approximates their semantics, to verify assertion violations, array out
Externí odkaz:
http://arxiv.org/abs/2302.02381
2LS ("tools") is a verification tool for C programs, built upon the CPROVER framework. It allows one to verify user-specified assertions, memory safety properties (e.g. buffer overflows), numerical overflows, division by zero, memory leaks, and termi
Externí odkaz:
http://arxiv.org/abs/2302.02380
Autor:
Maria Schrammel, ilse Marschalek
Publikováno v:
Journal of Responsible Technology, Vol 20, Iss , Pp 100095- (2024)
In response to the challenges posed by the complex field of food safety, the FOODSAFETY4EU project established four social labs conducting multi-actor co-creation processes. These labs served as platforms for developing and piloting innovative ideas
Externí odkaz:
https://doaj.org/article/0130aef7c5c94c33b8360b764981c7d6
Autor:
Nasahl, Pascal, Sultana, Salmin, Liljestrand, Hans, Grewal, Karanvir, LeMay, Michael, Durham, David M., Schrammel, David, Mangard, Stefan
Fault attacks enable adversaries to manipulate the control-flow of security-critical applications. By inducing targeted faults into the CPU, the software's call graph can be escaped and the control-flow can be redirected to arbitrary functions inside
Externí odkaz:
http://arxiv.org/abs/2301.13760
Autor:
Güdemann, Matthias, Schrammel, Peter
Automated test case generation tools help businesses to write tests and increase the safety net provided by high regression test coverage when making code changes. Test generation needs to cover as much as possible of the uncovered code while avoidin
Externí odkaz:
http://arxiv.org/abs/2212.14779
Autor:
Nasahl, Pascal, Unterguggenberger, Martin, Nagpal, Rishub, Schilling, Robert, Schrammel, David, Mangard, Stefan
Fault injection (FI) is a powerful attack methodology allowing an adversary to entirely break the security of a target device. As finite-state machines (FSMs) are fundamental hardware building blocks responsible for controlling systems, inducing faul
Externí odkaz:
http://arxiv.org/abs/2208.01356
Isolation is a long-standing challenge of software security. Traditional privilege rings and virtual memory are more and more augmented with concepts such as capabilities, protection keys, and powerful enclaves. At the same time, we are evidencing an
Externí odkaz:
http://arxiv.org/abs/2105.03395
Autor:
Gerald Wölkart, Alexander Kollau, Michael Russwurm, Doris Koesling, Astrid Schrammel, Bernd Mayer
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-14 (2023)
Abstract Chronic smoking causes dysfunction of vascular endothelial cells, evident as a reduction of flow-mediated dilation in smokers, but the role of nicotine is still controversial. Given the increasing use of e-cigarettes and other nicotine produ
Externí odkaz:
https://doaj.org/article/dca09c3b47c14977b47e1571587eea65