Artykuły w czasopismach na temat „Untrusted Code”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 49 najlepszych artykułów w czasopismach naukowych na temat „Untrusted Code”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Lampson, Butler. "Making untrusted code useful". Communications of the ACM 54, nr 11 (listopad 2011): 92. http://dx.doi.org/10.1145/2018396.2018418.
Pełny tekst źródłaPatel, Parveen, Andrew Whitaker, David Wetherall, Jay Lepreau i Tim Stack. "Upgrading transport protocols using untrusted mobile code". ACM SIGOPS Operating Systems Review 37, nr 5 (grudzień 2003): 1–14. http://dx.doi.org/10.1145/1165389.945447.
Pełny tekst źródłaSewell, Peter, i Jan Vitek. "Secure composition of untrusted code: box π, wrappers, and causality types". Journal of Computer Security 11, nr 2 (1.04.2003): 135–87. http://dx.doi.org/10.3233/jcs-2003-11202.
Pełny tekst źródłaBugerya, A. B., V. Yu Efimov, I. I. Kulagin, V. A. Padaryan, M. A. Solovev i A. Yu Tikhonov. "A software complex for revealing malicious behavior in untrusted binary code". Proceedings of the Institute for System Programming of the RAS 31, nr 6 (2019): 33–64. http://dx.doi.org/10.15514/ispras-2019-31(6)-3.
Pełny tekst źródłaLiu, Hua Xiao, i Ying Jin. "Enumeration Based Security Behavior Model Checking Algorithm". Applied Mechanics and Materials 20-23 (styczeń 2010): 808–13. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.808.
Pełny tekst źródłaHoward, Heidi, Fritz Alder, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Antoine Delignat-Lavaud i in. "Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability". Proceedings of the VLDB Endowment 17, nr 2 (październik 2023): 225–40. http://dx.doi.org/10.14778/3626292.3626304.
Pełny tekst źródłaHan, Jideng, Zhaoxin Zhang, Yuejin Du, Wei Wang i Xiuyuan Chen. "ESFuzzer: An Efficient Way to Fuzz WebAssembly Interpreter". Electronics 13, nr 8 (15.04.2024): 1498. http://dx.doi.org/10.3390/electronics13081498.
Pełny tekst źródłaFERRARI, GIANLUIGI, EUGENIO MOGGI i ROSARIO PUGLIESE. "MetaKlaim: a type safe multi-stage language for global computing". Mathematical Structures in Computer Science 14, nr 3 (20.05.2004): 367–95. http://dx.doi.org/10.1017/s0960129504004165.
Pełny tekst źródłaMitropoulos, Dimitris, i Diomidis Spinellis. "Fatal injection: a survey of modern code injection attack countermeasures". PeerJ Computer Science 3 (27.11.2017): e136. http://dx.doi.org/10.7717/peerj-cs.136.
Pełny tekst źródłaGourdin, Léo, Benjamin Bonneau, Sylvain Boulmé, David Monniaux i Alexandre Bérard. "Formally Verifying Optimizations with Block Simulations". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16.10.2023): 59–88. http://dx.doi.org/10.1145/3622799.
Pełny tekst źródłaMarkin, Dmitry Olegovich, Sergey Mikhailovich Makeev i Thaj Trung Ho. "Security threat level estimation for untrusted software based on TrustZone technology". Proceedings of the Institute for System Programming of the RAS 34, nr 1 (2022): 35–48. http://dx.doi.org/10.15514/ispras-2022-34(1)-3.
Pełny tekst źródłaPasupuleti, Syam Kumar. "Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code". International Journal of Cloud Applications and Computing 9, nr 4 (październik 2019): 1–20. http://dx.doi.org/10.4018/ijcac.2019100101.
Pełny tekst źródłaMironov, Denis Dmitrievich, Daniil Alekseevich Sigalov i Maxim Petrovich Malkov. "Research into Occurrence of Insecurely-Serialized Objects in Client-Side Code of Web-Applications". Proceedings of the Institute for System Programming of the RAS 35, nr 1 (2023): 223–36. http://dx.doi.org/10.15514/ispras-2023-35(1)-14.
Pełny tekst źródłaAndrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, Guido Martínez, Exequiel Rivas, Éric Tanter i Théo Winterhalter. "Securing Verified IO Programs Against Unverified Code in F*". Proceedings of the ACM on Programming Languages 8, POPL (5.01.2024): 2226–59. http://dx.doi.org/10.1145/3632916.
Pełny tekst źródłaDe Nicola, Rocco, i Michele Loreti. "Modelling global computations with Klaim". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, nr 1881 (31.07.2008): 3737–45. http://dx.doi.org/10.1098/rsta.2008.0148.
Pełny tekst źródłaKolosick, Matthew, Shravan Narayan, Evan Johnson, Conrad Watt, Michael LeMay, Deepak Garg, Ranjit Jhala i Deian Stefan. "Isolation without taxation: near-zero-cost transitions for WebAssembly and SFI". Proceedings of the ACM on Programming Languages 6, POPL (16.01.2022): 1–30. http://dx.doi.org/10.1145/3498688.
Pełny tekst źródłaLescisin, Michael, i Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security". International Journal of Systems and Software Security and Protection 9, nr 3 (lipiec 2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.
Pełny tekst źródłaKushwaha, Satpal Singh, Sandeep Joshi i Amit Kumar Gupta. "An efficient approach to secure smart contract of Ethereum blockchain using hybrid security analysis approach". Journal of Discrete Mathematical Sciences and Cryptography 26, nr 5 (2023): 1499–517. http://dx.doi.org/10.47974/jdmsc-1815.
Pełny tekst źródłaMondal, Anupam, Shreya Gangopadhyay, Durba Chatterjee, Harishma Boyapally i Debdeep Mukhopadhyay. "PReFeR : P hysically Re lated F unction bas e d R emote Attestation Protocol". ACM Transactions on Embedded Computing Systems 22, nr 5s (9.09.2023): 1–23. http://dx.doi.org/10.1145/3609104.
Pełny tekst źródłaFei, Shufan, Zheng Yan, Wenxiu Ding i Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures". ACM Computing Surveys 54, nr 6 (lipiec 2021): 1–36. http://dx.doi.org/10.1145/3456631.
Pełny tekst źródłaMiladinović, Danko, Adrian Milaković, Maja Vukasović, Žarko Stanisavljević i Pavle Vuletić. "Secure Multiparty Computation Using Secure Virtual Machines". Electronics 13, nr 5 (5.03.2024): 991. http://dx.doi.org/10.3390/electronics13050991.
Pełny tekst źródłaSong, Fuyuan, Yiwei Liu, Siyao Ma, Qin Jiang, Xiang Zhang i Zhangjie Fu. "Enabling Efficient and Privacy-Preserving Task Allocation with Temporal Access Control for Mobile Crowdsensing". Electronics 12, nr 14 (10.07.2023): 3016. http://dx.doi.org/10.3390/electronics12143016.
Pełny tekst źródłaMercadier, Darius, Viet Sang Nguyen, Matthieu Rivain i Aleksei Udovenko. "OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, nr 2 (12.03.2024): 588–629. http://dx.doi.org/10.46586/tches.v2024.i2.588-629.
Pełny tekst źródłaAlazzam, Farouq Ahmad Faleh, Ali Jabbar Salih, Maher Ali Moh`d Amoush i Fadiah Sami Ali Khasawneh. "The Nature of Electronic Contracts Using Blockchain Technology – Currency Bitcoin as an Example". Revista de Gestão Social e Ambiental 17, nr 5 (4.07.2023): e03330. http://dx.doi.org/10.24857/rgsa.v17n5-014.
Pełny tekst źródłaMekterović, Igor, Ljiljana Brkić i Marko Horvat. "Scaling Automated Programming Assessment Systems". Electronics 12, nr 4 (13.02.2023): 942. http://dx.doi.org/10.3390/electronics12040942.
Pełny tekst źródłaMorales-Sandoval, Miguel, José A. Molina, Heidy M. Marin-Castro i Jose Luis Gonzalez-Compean. "Blockchain support for execution, monitoring and discovery of inter-organizational business processes". PeerJ Computer Science 7 (29.09.2021): e731. http://dx.doi.org/10.7717/peerj-cs.731.
Pełny tekst źródłaSunitha, Surarapu, Nampalli Shirisha, Batchu Teja Sai Satish, Koyalakonda Vishnu i Timmanayanapeta Sankalp. "BLOCKCHAIN-BASED ACCESS CONTROL SYSTEM FOR CLOUD STORAGE". YMER Digital 21, nr 06 (16.06.2022): 446–50. http://dx.doi.org/10.37896/ymer21.06/43.
Pełny tekst źródłaGuo, Zhongfu, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou i Lingwei Wang. "LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network". Entropy 25, nr 7 (21.06.2023): 966. http://dx.doi.org/10.3390/e25070966.
Pełny tekst źródłaXu, Yang, Guojun Wang, Jidian Yang, Ju Ren, Yaoxue Zhang i Cheng Zhang. "Towards Secure Network Computing Services for Lightweight Clients Using Blockchain". Wireless Communications and Mobile Computing 2018 (13.11.2018): 1–12. http://dx.doi.org/10.1155/2018/2051693.
Pełny tekst źródłaKulkarni, Pallavi, Rajashri Khanai, Dattaprasad Torse, Nalini Iyer i Gururaj Bindagi. "Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment". Cryptography 7, nr 2 (4.05.2023): 23. http://dx.doi.org/10.3390/cryptography7020023.
Pełny tekst źródłaAyeni, Bakare K., Junaidu B. Sahalu i Kolawole R. Adeyanju. "Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System". Journal of Computer Networks and Communications 2018 (1.08.2018): 1–10. http://dx.doi.org/10.1155/2018/8159548.
Pełny tekst źródłaSaraswathy, K. S., i S. S. Sujatha. "Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search". International journal of electrical and computer engineering systems 13, nr 7 (30.09.2022): 569–75. http://dx.doi.org/10.32985/ijeces.13.7.9.
Pełny tekst źródłaWharton, Tracy, Emily Costello, Vincent Lafronza i Oscar Espinosa. "BARRIERS TO VACCINE UPTAKE IDENTIFIED BY COMMUNITY-BASED ORGANIZATIONS FOR INSITUTIONALLY UNDERSERVED GROUPS". Innovation in Aging 6, Supplement_1 (1.11.2022): 474–75. http://dx.doi.org/10.1093/geroni/igac059.1837.
Pełny tekst źródłaBirman, Ken. "Session details: Safely executing untrusted code". ACM SIGOPS Operating Systems Review 37, nr 5 (grudzień 2003). http://dx.doi.org/10.1145/3262203.
Pełny tekst źródłaVAN STRYDONCK, THOMAS, FRANK PIESSENS i DOMINIQUE DEVRIESE. "Linear capabilities for fully abstract compilation of separation-logic-verified code". Journal of Functional Programming 31 (2021). http://dx.doi.org/10.1017/s0956796821000022.
Pełny tekst źródła"A Hardware Sandbox Using Processor Virtualization for Untrusted Native Code". Applied Mechanics and Materials 519-520 (luty 2014): 368–72. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.368.
Pełny tekst źródłaGeorges, Aïna Linn, Armaël Guéneau, Thomas Van Strydonck, Amin Timany, Alix Trieu, Dominique Devriese i Lars Birkedal. "Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code". Journal of the ACM, 14.09.2023. http://dx.doi.org/10.1145/3623510.
Pełny tekst źródłaJiang, Zhuhan, Jiansheng Huang i Rezina Akhter. "Protection Tiers and Their Applications for Evaluating Untrusted Code on A Linux-Based Web Server". Journal of Communications, 2015. http://dx.doi.org/10.12720/jcm.10.11.918-925.
Pełny tekst źródłaKristensen, Mads Darø. "Scavenger - Mobile Remote Execution". DAIMI Report Series 37, nr 587 (1.01.2008). http://dx.doi.org/10.7146/dpb.v37i587.7223.
Pełny tekst źródłaOlivieri, Luca, Luca Negrini, Vincenzo Arceri, Thomas Jensen i Fausto Spoto. "Design and Implementation of Static Analyses for Tezos Smart Contracts". Distributed Ledger Technologies: Research and Practice, 29.01.2024. http://dx.doi.org/10.1145/3643567.
Pełny tekst źródłaTodo, Yosuke, i Takanori Isobe. "Hybrid Code Lifting on Space-Hard Block Ciphers". IACR Transactions on Symmetric Cryptology, 9.09.2022, 368–402. http://dx.doi.org/10.46586/tosc.v2022.i3.368-402.
Pełny tekst źródłaMuhammed, Younus Ameen, i Raghad Zuhair Yousif Al-Maqdici. "Robust security model utilizing 4D hyper-digital chaotic sequence for Joint-polar coding and SCMA scheme based IoT applications". Engineering Research Express, 14.12.2023. http://dx.doi.org/10.1088/2631-8695/ad15b6.
Pełny tekst źródłaSchneider, Moritz, Aritra Dhar, Ivan Puddu, Kari Kostiainen i Srdjan Čapkun. "Composite Enclaves: Towards Disaggregated Trusted Execution". IACR Transactions on Cryptographic Hardware and Embedded Systems, 19.11.2021, 630–56. http://dx.doi.org/10.46586/tches.v2022.i1.630-656.
Pełny tekst źródłaSayar, Imen, Alexandre Bartel, Eric Bodden i Yves Le Traon. "An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities". ACM Transactions on Software Engineering and Methodology, 5.08.2022. http://dx.doi.org/10.1145/3554732.
Pełny tekst źródłaNagy, Roland, Krisztián Németh, Dorottya Papp i Levente Buttyán. "Rootkit Detection on Embedded IoT Devices". Acta Cybernetica, 4.08.2021. http://dx.doi.org/10.14232/actacyb.288834.
Pełny tekst źródłaBroby, Daniel, Andrea Bracciali i Siham Lamssaoui. "A Decentralized Marketing Model for the Online Accommodation Rental Market". Journal of Business Thought, 2.09.2022, 1–12. http://dx.doi.org/10.18311/jbt/2022/30650.
Pełny tekst źródłaCui, Jinhua, Shweta Shinde, Satyaki Sen, Prateek Saxena i Pinghai Yuan. "Dynamic Binary Translation for SGX Enclaves". ACM Transactions on Privacy and Security, 2.05.2022. http://dx.doi.org/10.1145/3532862.
Pełny tekst źródłaWu Xiao-Dong i Huang Duan. "Plug-and-play discrete modulation continuous variable quantum key distribution based on non-Gaussian state-discrimination detection". Acta Physica Sinica, 2023, 0. http://dx.doi.org/10.7498/aps.72.20222253.
Pełny tekst źródłaLi, Shimin, Xin Wang i Rui Xue. "Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications". Computer Journal, 22.05.2021. http://dx.doi.org/10.1093/comjnl/bxab042.
Pełny tekst źródła