Artículos de revistas sobre el tema "Untrusted Code"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 49 mejores artículos de revistas para su investigación sobre el tema "Untrusted Code".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Lampson, Butler. "Making untrusted code useful". Communications of the ACM 54, n.º 11 (noviembre de 2011): 92. http://dx.doi.org/10.1145/2018396.2018418.
Texto completoPatel, Parveen, Andrew Whitaker, David Wetherall, Jay Lepreau y Tim Stack. "Upgrading transport protocols using untrusted mobile code". ACM SIGOPS Operating Systems Review 37, n.º 5 (diciembre de 2003): 1–14. http://dx.doi.org/10.1145/1165389.945447.
Texto completoSewell, Peter y Jan Vitek. "Secure composition of untrusted code: box π, wrappers, and causality types". Journal of Computer Security 11, n.º 2 (1 de abril de 2003): 135–87. http://dx.doi.org/10.3233/jcs-2003-11202.
Texto completoBugerya, A. B., V. Yu Efimov, I. I. Kulagin, V. A. Padaryan, M. A. Solovev y A. Yu Tikhonov. "A software complex for revealing malicious behavior in untrusted binary code". Proceedings of the Institute for System Programming of the RAS 31, n.º 6 (2019): 33–64. http://dx.doi.org/10.15514/ispras-2019-31(6)-3.
Texto completoLiu, Hua Xiao y Ying Jin. "Enumeration Based Security Behavior Model Checking Algorithm". Applied Mechanics and Materials 20-23 (enero de 2010): 808–13. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.808.
Texto completoHoward, Heidi, Fritz Alder, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Antoine Delignat-Lavaud et al. "Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability". Proceedings of the VLDB Endowment 17, n.º 2 (octubre de 2023): 225–40. http://dx.doi.org/10.14778/3626292.3626304.
Texto completoHan, Jideng, Zhaoxin Zhang, Yuejin Du, Wei Wang y Xiuyuan Chen. "ESFuzzer: An Efficient Way to Fuzz WebAssembly Interpreter". Electronics 13, n.º 8 (15 de abril de 2024): 1498. http://dx.doi.org/10.3390/electronics13081498.
Texto completoFERRARI, GIANLUIGI, EUGENIO MOGGI y ROSARIO PUGLIESE. "MetaKlaim: a type safe multi-stage language for global computing". Mathematical Structures in Computer Science 14, n.º 3 (20 de mayo de 2004): 367–95. http://dx.doi.org/10.1017/s0960129504004165.
Texto completoMitropoulos, Dimitris y Diomidis Spinellis. "Fatal injection: a survey of modern code injection attack countermeasures". PeerJ Computer Science 3 (27 de noviembre de 2017): e136. http://dx.doi.org/10.7717/peerj-cs.136.
Texto completoGourdin, Léo, Benjamin Bonneau, Sylvain Boulmé, David Monniaux y Alexandre Bérard. "Formally Verifying Optimizations with Block Simulations". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16 de octubre de 2023): 59–88. http://dx.doi.org/10.1145/3622799.
Texto completoMarkin, Dmitry Olegovich, Sergey Mikhailovich Makeev y Thaj Trung Ho. "Security threat level estimation for untrusted software based on TrustZone technology". Proceedings of the Institute for System Programming of the RAS 34, n.º 1 (2022): 35–48. http://dx.doi.org/10.15514/ispras-2022-34(1)-3.
Texto completoPasupuleti, Syam Kumar. "Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code". International Journal of Cloud Applications and Computing 9, n.º 4 (octubre de 2019): 1–20. http://dx.doi.org/10.4018/ijcac.2019100101.
Texto completoMironov, Denis Dmitrievich, Daniil Alekseevich Sigalov y Maxim Petrovich Malkov. "Research into Occurrence of Insecurely-Serialized Objects in Client-Side Code of Web-Applications". Proceedings of the Institute for System Programming of the RAS 35, n.º 1 (2023): 223–36. http://dx.doi.org/10.15514/ispras-2023-35(1)-14.
Texto completoAndrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, Guido Martínez, Exequiel Rivas, Éric Tanter y Théo Winterhalter. "Securing Verified IO Programs Against Unverified Code in F*". Proceedings of the ACM on Programming Languages 8, POPL (5 de enero de 2024): 2226–59. http://dx.doi.org/10.1145/3632916.
Texto completoDe Nicola, Rocco y Michele Loreti. "Modelling global computations with Klaim". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, n.º 1881 (31 de julio de 2008): 3737–45. http://dx.doi.org/10.1098/rsta.2008.0148.
Texto completoKolosick, Matthew, Shravan Narayan, Evan Johnson, Conrad Watt, Michael LeMay, Deepak Garg, Ranjit Jhala y Deian Stefan. "Isolation without taxation: near-zero-cost transitions for WebAssembly and SFI". Proceedings of the ACM on Programming Languages 6, POPL (16 de enero de 2022): 1–30. http://dx.doi.org/10.1145/3498688.
Texto completoLescisin, Michael y Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security". International Journal of Systems and Software Security and Protection 9, n.º 3 (julio de 2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.
Texto completoKushwaha, Satpal Singh, Sandeep Joshi y Amit Kumar Gupta. "An efficient approach to secure smart contract of Ethereum blockchain using hybrid security analysis approach". Journal of Discrete Mathematical Sciences and Cryptography 26, n.º 5 (2023): 1499–517. http://dx.doi.org/10.47974/jdmsc-1815.
Texto completoMondal, Anupam, Shreya Gangopadhyay, Durba Chatterjee, Harishma Boyapally y Debdeep Mukhopadhyay. "PReFeR : P hysically Re lated F unction bas e d R emote Attestation Protocol". ACM Transactions on Embedded Computing Systems 22, n.º 5s (9 de septiembre de 2023): 1–23. http://dx.doi.org/10.1145/3609104.
Texto completoFei, Shufan, Zheng Yan, Wenxiu Ding y Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures". ACM Computing Surveys 54, n.º 6 (julio de 2021): 1–36. http://dx.doi.org/10.1145/3456631.
Texto completoMiladinović, Danko, Adrian Milaković, Maja Vukasović, Žarko Stanisavljević y Pavle Vuletić. "Secure Multiparty Computation Using Secure Virtual Machines". Electronics 13, n.º 5 (5 de marzo de 2024): 991. http://dx.doi.org/10.3390/electronics13050991.
Texto completoSong, Fuyuan, Yiwei Liu, Siyao Ma, Qin Jiang, Xiang Zhang y Zhangjie Fu. "Enabling Efficient and Privacy-Preserving Task Allocation with Temporal Access Control for Mobile Crowdsensing". Electronics 12, n.º 14 (10 de julio de 2023): 3016. http://dx.doi.org/10.3390/electronics12143016.
Texto completoMercadier, Darius, Viet Sang Nguyen, Matthieu Rivain y Aleksei Udovenko. "OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 2 (12 de marzo de 2024): 588–629. http://dx.doi.org/10.46586/tches.v2024.i2.588-629.
Texto completoAlazzam, Farouq Ahmad Faleh, Ali Jabbar Salih, Maher Ali Moh`d Amoush y Fadiah Sami Ali Khasawneh. "The Nature of Electronic Contracts Using Blockchain Technology – Currency Bitcoin as an Example". Revista de Gestão Social e Ambiental 17, n.º 5 (4 de julio de 2023): e03330. http://dx.doi.org/10.24857/rgsa.v17n5-014.
Texto completoMekterović, Igor, Ljiljana Brkić y Marko Horvat. "Scaling Automated Programming Assessment Systems". Electronics 12, n.º 4 (13 de febrero de 2023): 942. http://dx.doi.org/10.3390/electronics12040942.
Texto completoMorales-Sandoval, Miguel, José A. Molina, Heidy M. Marin-Castro y Jose Luis Gonzalez-Compean. "Blockchain support for execution, monitoring and discovery of inter-organizational business processes". PeerJ Computer Science 7 (29 de septiembre de 2021): e731. http://dx.doi.org/10.7717/peerj-cs.731.
Texto completoSunitha, Surarapu, Nampalli Shirisha, Batchu Teja Sai Satish, Koyalakonda Vishnu y Timmanayanapeta Sankalp. "BLOCKCHAIN-BASED ACCESS CONTROL SYSTEM FOR CLOUD STORAGE". YMER Digital 21, n.º 06 (16 de junio de 2022): 446–50. http://dx.doi.org/10.37896/ymer21.06/43.
Texto completoGuo, Zhongfu, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou y Lingwei Wang. "LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network". Entropy 25, n.º 7 (21 de junio de 2023): 966. http://dx.doi.org/10.3390/e25070966.
Texto completoXu, Yang, Guojun Wang, Jidian Yang, Ju Ren, Yaoxue Zhang y Cheng Zhang. "Towards Secure Network Computing Services for Lightweight Clients Using Blockchain". Wireless Communications and Mobile Computing 2018 (13 de noviembre de 2018): 1–12. http://dx.doi.org/10.1155/2018/2051693.
Texto completoKulkarni, Pallavi, Rajashri Khanai, Dattaprasad Torse, Nalini Iyer y Gururaj Bindagi. "Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment". Cryptography 7, n.º 2 (4 de mayo de 2023): 23. http://dx.doi.org/10.3390/cryptography7020023.
Texto completoAyeni, Bakare K., Junaidu B. Sahalu y Kolawole R. Adeyanju. "Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System". Journal of Computer Networks and Communications 2018 (1 de agosto de 2018): 1–10. http://dx.doi.org/10.1155/2018/8159548.
Texto completoSaraswathy, K. S. y S. S. Sujatha. "Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search". International journal of electrical and computer engineering systems 13, n.º 7 (30 de septiembre de 2022): 569–75. http://dx.doi.org/10.32985/ijeces.13.7.9.
Texto completoWharton, Tracy, Emily Costello, Vincent Lafronza y Oscar Espinosa. "BARRIERS TO VACCINE UPTAKE IDENTIFIED BY COMMUNITY-BASED ORGANIZATIONS FOR INSITUTIONALLY UNDERSERVED GROUPS". Innovation in Aging 6, Supplement_1 (1 de noviembre de 2022): 474–75. http://dx.doi.org/10.1093/geroni/igac059.1837.
Texto completoBirman, Ken. "Session details: Safely executing untrusted code". ACM SIGOPS Operating Systems Review 37, n.º 5 (diciembre de 2003). http://dx.doi.org/10.1145/3262203.
Texto completoVAN STRYDONCK, THOMAS, FRANK PIESSENS y DOMINIQUE DEVRIESE. "Linear capabilities for fully abstract compilation of separation-logic-verified code". Journal of Functional Programming 31 (2021). http://dx.doi.org/10.1017/s0956796821000022.
Texto completo"A Hardware Sandbox Using Processor Virtualization for Untrusted Native Code". Applied Mechanics and Materials 519-520 (febrero de 2014): 368–72. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.368.
Texto completoGeorges, Aïna Linn, Armaël Guéneau, Thomas Van Strydonck, Amin Timany, Alix Trieu, Dominique Devriese y Lars Birkedal. "Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code". Journal of the ACM, 14 de septiembre de 2023. http://dx.doi.org/10.1145/3623510.
Texto completoJiang, Zhuhan, Jiansheng Huang y Rezina Akhter. "Protection Tiers and Their Applications for Evaluating Untrusted Code on A Linux-Based Web Server". Journal of Communications, 2015. http://dx.doi.org/10.12720/jcm.10.11.918-925.
Texto completoKristensen, Mads Darø. "Scavenger - Mobile Remote Execution". DAIMI Report Series 37, n.º 587 (1 de enero de 2008). http://dx.doi.org/10.7146/dpb.v37i587.7223.
Texto completoOlivieri, Luca, Luca Negrini, Vincenzo Arceri, Thomas Jensen y Fausto Spoto. "Design and Implementation of Static Analyses for Tezos Smart Contracts". Distributed Ledger Technologies: Research and Practice, 29 de enero de 2024. http://dx.doi.org/10.1145/3643567.
Texto completoTodo, Yosuke y Takanori Isobe. "Hybrid Code Lifting on Space-Hard Block Ciphers". IACR Transactions on Symmetric Cryptology, 9 de septiembre de 2022, 368–402. http://dx.doi.org/10.46586/tosc.v2022.i3.368-402.
Texto completoMuhammed, Younus Ameen y Raghad Zuhair Yousif Al-Maqdici. "Robust security model utilizing 4D hyper-digital chaotic sequence for Joint-polar coding and SCMA scheme based IoT applications". Engineering Research Express, 14 de diciembre de 2023. http://dx.doi.org/10.1088/2631-8695/ad15b6.
Texto completoSchneider, Moritz, Aritra Dhar, Ivan Puddu, Kari Kostiainen y Srdjan Čapkun. "Composite Enclaves: Towards Disaggregated Trusted Execution". IACR Transactions on Cryptographic Hardware and Embedded Systems, 19 de noviembre de 2021, 630–56. http://dx.doi.org/10.46586/tches.v2022.i1.630-656.
Texto completoSayar, Imen, Alexandre Bartel, Eric Bodden y Yves Le Traon. "An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities". ACM Transactions on Software Engineering and Methodology, 5 de agosto de 2022. http://dx.doi.org/10.1145/3554732.
Texto completoNagy, Roland, Krisztián Németh, Dorottya Papp y Levente Buttyán. "Rootkit Detection on Embedded IoT Devices". Acta Cybernetica, 4 de agosto de 2021. http://dx.doi.org/10.14232/actacyb.288834.
Texto completoBroby, Daniel, Andrea Bracciali y Siham Lamssaoui. "A Decentralized Marketing Model for the Online Accommodation Rental Market". Journal of Business Thought, 2 de septiembre de 2022, 1–12. http://dx.doi.org/10.18311/jbt/2022/30650.
Texto completoCui, Jinhua, Shweta Shinde, Satyaki Sen, Prateek Saxena y Pinghai Yuan. "Dynamic Binary Translation for SGX Enclaves". ACM Transactions on Privacy and Security, 2 de mayo de 2022. http://dx.doi.org/10.1145/3532862.
Texto completoWu Xiao-Dong y Huang Duan. "Plug-and-play discrete modulation continuous variable quantum key distribution based on non-Gaussian state-discrimination detection". Acta Physica Sinica, 2023, 0. http://dx.doi.org/10.7498/aps.72.20222253.
Texto completoLi, Shimin, Xin Wang y Rui Xue. "Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications". Computer Journal, 22 de mayo de 2021. http://dx.doi.org/10.1093/comjnl/bxab042.
Texto completo