Computer intrusions can occur in various ways. Many of them occur by exploiting program flaws and system configuration errors. Existing solutions that detects specific kinds of flaws are substantially different from each other, so aggregate use of them may be incompatible and require substantial changes in the current system and computing practice. Intrusion detection systems may not be the answer either, because they are inherently inaccurate and susceptible to false positives/negatives. This dissertation presents a taxonomy of security flaws that classifies program vulnerabilities into finite number of error categories, and presents a security mechanism that can produce accurate solutions for many of these error categories in a modular fa...
Some computer security breaches cannot be prevented using access and information flow control techni...
Many users value applications that continue execution in the face of attacks. Current software prote...
Fault injection has increasingly been used both to attack software applications, and to test system ...
We demonstrate how software vulnerabilities compromise the security of a computer system. A variety ...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Abstract. We introduce software integrity checking expressions (Soft-ICEs), which are program predic...
This thesis contributes to three research areas in software security, namely security requirements a...
307 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2009.The key insight in this disse...
Producing secure software is extremely hard to do right. The number of security flaws and vulnerabi...
Software assurance is of paramount importance given the increasing impact of software on our lives. ...
In distributed systems, if a hardware fault corrupts the state of a process, this error might propag...
Computers embedded in satellites are sensitive to cosmic radiations. These cause transient faults th...
Call number: LD2668 .T4 CMSC 1989 V37Master of ScienceComputing and Information Science
Abstract Today, computer systems are plagued with stability and security problems: applications lose...
ABSTRACT Improper access of data buffers is one of the most common errors in programs written in ass...
Some computer security breaches cannot be prevented using access and information flow control techni...
Many users value applications that continue execution in the face of attacks. Current software prote...
Fault injection has increasingly been used both to attack software applications, and to test system ...
We demonstrate how software vulnerabilities compromise the security of a computer system. A variety ...
The goal of the research presented in this dissertation is to prevent, detect, and mitigate maliciou...
Abstract. We introduce software integrity checking expressions (Soft-ICEs), which are program predic...
This thesis contributes to three research areas in software security, namely security requirements a...
307 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2009.The key insight in this disse...
Producing secure software is extremely hard to do right. The number of security flaws and vulnerabi...
Software assurance is of paramount importance given the increasing impact of software on our lives. ...
In distributed systems, if a hardware fault corrupts the state of a process, this error might propag...
Computers embedded in satellites are sensitive to cosmic radiations. These cause transient faults th...
Call number: LD2668 .T4 CMSC 1989 V37Master of ScienceComputing and Information Science
Abstract Today, computer systems are plagued with stability and security problems: applications lose...
ABSTRACT Improper access of data buffers is one of the most common errors in programs written in ass...
Some computer security breaches cannot be prevented using access and information flow control techni...
Many users value applications that continue execution in the face of attacks. Current software prote...
Fault injection has increasingly been used both to attack software applications, and to test system ...