Gotowa bibliografia na temat „Untrusted Code”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Untrusted Code”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Untrusted Code"
Lampson, Butler. "Making untrusted code useful". Communications of the ACM 54, nr 11 (listopad 2011): 92. http://dx.doi.org/10.1145/2018396.2018418.
Pełny tekst źródłaPatel, Parveen, Andrew Whitaker, David Wetherall, Jay Lepreau i Tim Stack. "Upgrading transport protocols using untrusted mobile code". ACM SIGOPS Operating Systems Review 37, nr 5 (grudzień 2003): 1–14. http://dx.doi.org/10.1145/1165389.945447.
Pełny tekst źródłaSewell, Peter, i Jan Vitek. "Secure composition of untrusted code: box π, wrappers, and causality types". Journal of Computer Security 11, nr 2 (1.04.2003): 135–87. http://dx.doi.org/10.3233/jcs-2003-11202.
Pełny tekst źródłaBugerya, A. B., V. Yu Efimov, I. I. Kulagin, V. A. Padaryan, M. A. Solovev i A. Yu Tikhonov. "A software complex for revealing malicious behavior in untrusted binary code". Proceedings of the Institute for System Programming of the RAS 31, nr 6 (2019): 33–64. http://dx.doi.org/10.15514/ispras-2019-31(6)-3.
Pełny tekst źródłaLiu, Hua Xiao, i Ying Jin. "Enumeration Based Security Behavior Model Checking Algorithm". Applied Mechanics and Materials 20-23 (styczeń 2010): 808–13. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.808.
Pełny tekst źródłaHoward, Heidi, Fritz Alder, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Antoine Delignat-Lavaud i in. "Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability". Proceedings of the VLDB Endowment 17, nr 2 (październik 2023): 225–40. http://dx.doi.org/10.14778/3626292.3626304.
Pełny tekst źródłaHan, Jideng, Zhaoxin Zhang, Yuejin Du, Wei Wang i Xiuyuan Chen. "ESFuzzer: An Efficient Way to Fuzz WebAssembly Interpreter". Electronics 13, nr 8 (15.04.2024): 1498. http://dx.doi.org/10.3390/electronics13081498.
Pełny tekst źródłaFERRARI, GIANLUIGI, EUGENIO MOGGI i ROSARIO PUGLIESE. "MetaKlaim: a type safe multi-stage language for global computing". Mathematical Structures in Computer Science 14, nr 3 (20.05.2004): 367–95. http://dx.doi.org/10.1017/s0960129504004165.
Pełny tekst źródłaMitropoulos, Dimitris, i Diomidis Spinellis. "Fatal injection: a survey of modern code injection attack countermeasures". PeerJ Computer Science 3 (27.11.2017): e136. http://dx.doi.org/10.7717/peerj-cs.136.
Pełny tekst źródłaGourdin, Léo, Benjamin Bonneau, Sylvain Boulmé, David Monniaux i Alexandre Bérard. "Formally Verifying Optimizations with Block Simulations". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16.10.2023): 59–88. http://dx.doi.org/10.1145/3622799.
Pełny tekst źródłaRozprawy doktorskie na temat "Untrusted Code"
Menage, Paul Barnaby. "Resource control of untrusted code in an open programmable network". Thesis, University of Cambridge, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621902.
Pełny tekst źródłaCarpentier, Robin. "Privacy-preserving third-party computations on secure personal data management systems". Electronic Thesis or Diss., université Paris-Saclay, 2022. http://www.theses.fr/2022UPASG079.
Pełny tekst źródłaThe privacy of individuals is constantly undermined by some of the most prominent companies in the world which centralize vast amounts of personal data. Recent legal means such as the General Data Protection Regulation in Europe regulate the collection and processing of citizens' data. In particular, data portability grants individuals the right to recover a copy of their data held by an organization. At the same time, Personal Data Management Systems (PDMS) are emerging, empowering users by facilitating the management of their data. For example, these solutions enable automatic data collection, sharing, and advanced processing. In these solutions, the user's data is processed directly where it is stored by a processing code potentially written by a third party. Here, only the results are shared with a third party upon the user's decision. This paradigm diverges from the traditional approach in which the user's data is entirely shared with a third party for processing. To be viable, PDMS must satisfy two prerequisites: they must ensure the security of the data in the presence of a layman user while being as extensible as possible to support diverse computations on this data. To address this conflict between extensibility and security, this thesis relies on an architecture including third-party modules coupled with hardware security mechanisms called Trusted Executions Environments. In this context, we propose security building blocks to limit data leakage resulting from the use of these third-party modules as well as execution strategies implementing these building blocks and limiting the impact on performances
Roy, Indrajit. "Protecting sensitive information from untrusted code". Thesis, 2010. http://hdl.handle.net/2152/ETD-UT-2010-08-1951.
Pełny tekst źródłatext
Części książek na temat "Untrusted Code"
Wen, Yan, Jinjing Zhao i Huaimin Wang. "A Novel Approach for Untrusted Code Execution". W Information and Communications Security, 398–411. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77048-0_31.
Pełny tekst źródłaNecula, George C., i Peter Lee. "Safe, Untrusted Agents Using Proof-Carrying Code". W Lecture Notes in Computer Science, 61–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-68671-1_5.
Pełny tekst źródłaNecula, George C., i Robert R. Schneck. "Proof-Carrying Code with Untrusted Proof Rules". W Software Security — Theories and Systems, 283–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36532-x_18.
Pełny tekst źródłaStaats, Matthew, i Mats P. E. Heimdahl. "Partial Translation Verification for Untrusted Code-Generators". W Formal Methods and Software Engineering, 226–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88194-0_15.
Pełny tekst źródłaBottesch, Ralph, Max W. Haslbeck, Alban Reynaud i René Thiemann. "Verifying a Solver for Linear Mixed Integer Arithmetic in Isabelle/HOL". W Lecture Notes in Computer Science, 233–50. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55754-6_14.
Pełny tekst źródłaBoldrin, Luca, Giovanni Paolo Sellitto i Jaak Tepandi. "TOOP Trust Architecture". W The Once-Only Principle, 126–40. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79851-2_7.
Pełny tekst źródła"Verifiable Computing: Secure Code Execution Despite Untrusted Software and Hardware". W Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers. ACM, 2014. http://dx.doi.org/10.1145/2611399.2611406.
Pełny tekst źródłaPistoia, Marco, Omer Tripp i David Lubensky. "Combining Static Code Analysis and Machine Learning for Automatic Detection of Security Vulnerabilities in Mobile Apps". W Application Development and Design, 1121–47. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3422-8.ch047.
Pełny tekst źródłaPasupuleti, Syam Kumar. "Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code". W Research Anthology on Privatizing and Securing Data, 1003–22. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8954-0.ch046.
Pełny tekst źródłaPistoia, Marco, Omer Tripp i David Lubensky. "Combining Static Code Analysis and Machine Learning for Automatic Detection of Security Vulnerabilities in Mobile Apps". W Mobile Application Development, Usability, and Security, 68–94. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0945-5.ch004.
Pełny tekst źródłaStreszczenia konferencji na temat "Untrusted Code"
Birman, Ken. "Session details: Safely executing untrusted code". W SOSP03: ACM Symposium on Operating Systems Principles. New York, NY, USA: ACM, 2003. http://dx.doi.org/10.1145/3245957.
Pełny tekst źródłaPatel, Parveen, Andrew Whitaker, David Wetherall, Jay Lepreau i Tim Stack. "Upgrading transport protocols using untrusted mobile code". W the nineteenth ACM symposium. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/945445.945447.
Pełny tekst źródłaLeontie, Eugen, Gedare Bloom, Bhagirath Narahari, Rahul Simha i Joseph Zambreno. "Hardware-enforced fine-grained isolation of untrusted code". W the first ACM workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1655077.1655082.
Pełny tekst źródłaWartell, Richard, Vishwath Mohan, Kevin W. Hamlen i Zhiqiang Lin. "Securing untrusted code via compiler-agnostic binary rewriting". W the 28th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2420950.2420995.
Pełny tekst źródłaYee, Bennet, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula i Nicholas Fullagar. "Native Client: A Sandbox for Portable, Untrusted x86 Native Code". W 2009 30th IEEE Symposium on Security and Privacy (SP). IEEE, 2009. http://dx.doi.org/10.1109/sp.2009.25.
Pełny tekst źródłaZhang, Linfeng, Yan Wen i Kai Du. "Pollux VMM: A Virtual Machine Monitor for Executing Untrusted Code". W 2009 First International Conference on Information Science and Engineering. IEEE, 2009. http://dx.doi.org/10.1109/icise.2009.835.
Pełny tekst źródłaWen, Yan, Jinjing Zhao, Gang Zhao, Hua Chen i Dongxia Wang. "A Survey of Virtualization Technologies Focusing on Untrusted Code Execution". W 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). IEEE, 2012. http://dx.doi.org/10.1109/imis.2012.92.
Pełny tekst źródłaGao, Zhenzhen, Xuewen Liao, Xiaodong Sun i Shihua Zhu. "A secure space-time code for asynchronous cooperative communication systems with untrusted relays". W 2013 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2013. http://dx.doi.org/10.1109/wcnc.2013.6555250.
Pełny tekst źródłaShahani, Snehkumar, Jibi Abraham i Venkateswaran. "Techniques for Privacy-Preserving Data Aggregation in an Untrusted Distributed Environment". W CODS-COMAD 2023: 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD). New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3570991.3571020.
Pełny tekst źródłaLin, Elizabeth, Igibek Koishybayev, Trevor Dunlap, William Enck i Alexandros Kapravelos. "UntrustIDE: Exploiting Weaknesses in VS Code Extensions". W Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2024. http://dx.doi.org/10.14722/ndss.2024.24073.
Pełny tekst źródła