Filters








17,668 Hits in 6.6 sec

Overview of existing safeguarding techniques for automatically generated code

Ingo Stürmer, Daniela Weinberg, Mirko Conrad
2005 Software engineering notes  
In this paper, we will present and discuss state-of-the-art techniques for safeguarding automatic code generation applied in model-based development. © ACM, (2005) This is the author's version of the work  ...  Since the code is often deployed in safety-related environments, the quality of the code generators is of paramount importance.  ...  Acknowledgement The work described was partially performed as part of the IMMOS project funded by the German Federal Ministry of Education and Research (project ref. 01ISC31D). http://www.immosproject.de  ... 
doi:10.1145/1082983.1083192 fatcat:qkklasq3izgajirw4ilplpsyo4

Overview of existing safeguarding techniques for automatically generated code

Ingo Stürmer, Daniela Weinberg, Mirko Conrad
2005 Proceedings of the second international workshop on Software engineering for automotive systems - SEAS '05  
In this paper, we will present and discuss state-of-the-art techniques for safeguarding automatic code generation applied in model-based development. © ACM, (2005) This is the author's version of the work  ...  Since the code is often deployed in safety-related environments, the quality of the code generators is of paramount importance.  ...  Acknowledgement The work described was partially performed as part of the IMMOS project funded by the German Federal Ministry of Education and Research (project ref. 01ISC31D). http://www.immosproject.de  ... 
doi:10.1145/1083190.1083192 fatcat:jurrd3ypqzfqddp7lrsyfjqk7q

A new concept for safeguarding and labeling of long-term stored waste and its place in the scope of existing tagging techniques [article]

Dina Chernikova, Kåre Axell
2014 arXiv   pre-print
As one of the options for a new labeling method it is proposed to use a multidimensional bar code symbology and tungsten plate with ultrasound techniques.  ...  It is shown that the new radioisotope label offers several advantages in the scope of existing tagging techniques (overview is given) and can be implemented even with low activity sources.  ...  Overview of existing methods The conventional tagging techniques include etching characters, affixing identification plates, welding, etc.  ... 
arXiv:1402.2173v1 fatcat:toojiwyawzerphj54n52yww5vu

Automatic collection, analysis, access, and archiving of individual and group psycho-social behavior

Scott Stevens, Ashok Bharucha, Michael Christel, Alexander Hauptmann, Howard Wactlar, Datong Chen
2006 Proceedings of the 3rd ACM workshop on Continuous archival and retrival of personal experences - CARPE '06  
Computer machine learning techniques are being applied to the resulting 25 Terabytes of data, automatically processing the record for efficient use by analytical observers (e.g., social and behavioral  ...  cameras, 24 hours a day for 25 days, ensuring an un-occluded view of every point in the recorded space.  ...  amount of training data for developing automatic classifiers.  ... 
doi:10.1145/1178657.1178664 fatcat:evvipifqbnamfhdbkkv7uruqge

An Overview of Prevention/Mitigation against Memory Corruption Attack

Mahmood Jasim Khalsan, Michael Opoku Agyeman
2018 Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control - ISCSIC '18  
In this work, we present an overview of the Memory corruption attacks and the existing mitigation techniques for both compilers and operating systems.  ...  It is a vulnerability where a memory location contents of a computer system are altered because of programming errors allowing execution of arbitrary codes.  ...  initial or these variables initialized with zero for these variables, BSS will generate automatically.  ... 
doi:10.1145/3284557.3284564 fatcat:kmhje46j3ndmbl7q7d4wvmxhk4

Synthesis of Fault Detection Mechanisms TRACK: Real-Time, Embedded and Physical Systems

Dominik Sojer
2011 2011 IEEE 35th Annual Computer Software and Applications Conference  
The key is to generate most of the required source code automatically. A lot of research has been performed on this idea, however, as this is a very broad field, some problems are still unsolved.  ...  environment for the online rootcause analysis of occurred failures and model transformations for the generation of required system documentation.  ...  This approach is a novel idea in the area of code generation for safety-critical systems.  ... 
doi:10.1109/compsac.2011.108 dblp:conf/compsac/Sojer11 fatcat:chgfaf5fzvdllb3vbusc33bivy

Web-based system evolution in model driven architecture

Feng Chen, Hongji Yang, Hong Zhou, Bing Qiao, Huifang Deng
2008 2008 10th International Symposium on Web Site Evolution  
The complexity and size of commercial Web-based systems present a grand challenge to the traditional methodology of software evolution.  ...  The booming development of Web related technologies complicates the situation.  ...  The work presented in [13] is to investigate the feasibility of adopting MDA techniques for their legacy systems, in order to safeguard the future maintainability of these systems.  ... 
doi:10.1109/wse.2008.4655398 dblp:conf/wse/ChenYZQD08 fatcat:kvuvrk66vnd4bazplbjfyuloha

Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation [chapter]

Michelle Zhou, Prithvi Bisht, V. N. Venkatakrishnan
2010 Lecture Notes in Computer Science  
In this paper, we propose an approach that automatically retrofits the source code of legacy web applications with a widely-used defense approach for this attack.  ...  Our approach addresses a number of shortcomings in prior blackbox solutions for automatic XSRF protection.  ...  Acknowledgments We thank Katya Kisyova and Lenore Zuck for many insightful discussions that helped to shape principal ideas of this work, as well as the anonymous reviewers for their helpful and thorough  ... 
doi:10.1007/978-3-642-17714-9_8 fatcat:wusnnhmeifaq3jt2yu3csaplvu

A framework for quality assessment of ROS repositories

Andre Santos, Alcino Cunha, Nuno Macedo, Claudio Lourenco
2016 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)  
providing a first overview of the internal quality of the software being developed in this community.  ...  This paper presents HAROS, a generic, plug-in-driven, framework to evaluate code quality, through static analysis, in the context of the Robot Operating System (ROS), one of the most widely used robotic  ...  techniques (for instance, it should support the extraction of code metrics and compliance with coding standards, but also more advanced analysis techniques).  ... 
doi:10.1109/iros.2016.7759661 dblp:conf/iros/SantosCML16 fatcat:q7xr33j3wrdw5iz5zdzo6yjygm

Safeguarding MTC at the Physical Layer: Potentials and Challenges

D. P. Moya Osorio, E. E. Benitez Olivo, H. Alves, M. Latva-aho
2020 IEEE Access  
In light of this, herein we provide an overview on some promising physical-layer techniques, focusing on the requirements and design challenges for machine-type communication scenarios.  ...  In this regard, physical layer security has been recognized as a potential solution to safeguard the confidentiality and privacy of communications in such stringent scenarios.  ...  to complement existing security techniques [6] .  ... 
doi:10.1109/access.2020.2996383 fatcat:espxiyuqnfgcvgw2yxy4p24vxy

Programming with Explicit Security Policies [chapter]

Andrew C. Myers
2005 Lecture Notes in Computer Science  
This is an overview of programming with explicit information security policies with an outline of some future challenges.  ...  Trustworthy systems must safeguard the endto-end confidentiality, integrity, and availability of information they manipulate.  ...  The transformation employs not only partitioning, but also all of the distributed security mechanisms above to generate distributed code for Jif programs.  ... 
doi:10.1007/978-3-540-31987-0_1 fatcat:trdheihpijgrzph3i6kyzywn4m

Hybrid Workflow and Bayesian Networks to Correlate Information in the Protection of Large Scale Critical Infrastructures

John Bigham, Xuan Jin, David Gamez, Chris Phillips
2005 Electronical Notes in Theoretical Computer Science  
The workflow management system interprets workflow models, which are represented by augmented Petri Nets modelling generic forms of attack or failure.  ...  This paper describes the embedding of a workflow management system within one of the Safeguard agents to support real-time correlation of information from anomaly detectors, intrusion detection systems  ...  Acknowledgement This work was partially funded by the CEC as part of the Safeguard project.  ... 
doi:10.1016/j.entcs.2004.10.009 fatcat:y6q2rmhvtff6ld44fkount7use

FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking [article]

Run Wang, Felix Juefei-Xu, Meng Luo, Yang Liu, Lina Wang
2021 arXiv   pre-print
Our research finding confirms effective privacy-preserving techniques for protecting personal photos from being DeepFaked.  ...  In recent years, DeepFake is becoming a common threat to our society, due to the remarkable progress of generative adversarial networks (GAN) in image synthesis.  ...  Specifically, the functionalities of each component as follows. Image Tagging Pipeline 4.2.1 Overview. • The message generator generates binary message from channel coding.  ... 
arXiv:2009.09869v3 fatcat:eemjt2fnxrgr7eg4dursbec5hu

Automated Fine Grained Traceability Links Recovery between High Level Requirements and Source Code Implementations

Alejandro Velasco, Jairo Aponte
2020 ParadigmPlus  
Furthermore, there exist application contexts where this becomes a mandatory process, for instance, banking and healthcare.  ...  Software Traceability has been a matter of discussion in the Software Engineering community for a long time.  ...  Even though the static code analysis techniques have played a determining role in the creation of automatic techniques for the recovery of traceability links, our approach properly combines those techniques  ... 
doi:10.55969/paradigmplus.v1n2a2 fatcat:h6uqxvy5wfb25mp4yl7v3s4cpu

Smart Card Based Protection for Dalvik Bytecode — Dynamically Loadable Component of an Android APK

Muhammad Shoaib, Noor Yasin, Abdul G. Abbassi
2016 Journal of clean energy technologies  
Android, an open source platform of Google has become one of the most popular mobile operating systems. Android apps generate lot of revenue which is increasing every year.  ...  The goal is to minimize software flaws and use anti-reverse engineering techniques.  ...  An overview of design is given in Fig. 3 . A.  ... 
doi:10.7763/ijcte.2016.v8.1036 fatcat:nh3ncsa4jbgdjfvezccl2kmd7m
« Previous Showing results 1 — 15 out of 17,668 results