Artigos de revistas sobre o tema "Untrusted Code"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 49 melhores artigos de revistas para estudos sobre o assunto "Untrusted Code".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Lampson, Butler. "Making untrusted code useful". Communications of the ACM 54, n.º 11 (novembro de 2011): 92. http://dx.doi.org/10.1145/2018396.2018418.
Texto completo da fontePatel, Parveen, Andrew Whitaker, David Wetherall, Jay Lepreau e Tim Stack. "Upgrading transport protocols using untrusted mobile code". ACM SIGOPS Operating Systems Review 37, n.º 5 (dezembro de 2003): 1–14. http://dx.doi.org/10.1145/1165389.945447.
Texto completo da fonteSewell, Peter, e Jan Vitek. "Secure composition of untrusted code: box π, wrappers, and causality types". Journal of Computer Security 11, n.º 2 (1 de abril de 2003): 135–87. http://dx.doi.org/10.3233/jcs-2003-11202.
Texto completo da fonteBugerya, A. B., V. Yu Efimov, I. I. Kulagin, V. A. Padaryan, M. A. Solovev e A. Yu Tikhonov. "A software complex for revealing malicious behavior in untrusted binary code". Proceedings of the Institute for System Programming of the RAS 31, n.º 6 (2019): 33–64. http://dx.doi.org/10.15514/ispras-2019-31(6)-3.
Texto completo da fonteLiu, Hua Xiao, e Ying Jin. "Enumeration Based Security Behavior Model Checking Algorithm". Applied Mechanics and Materials 20-23 (janeiro de 2010): 808–13. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.808.
Texto completo da fonteHoward, Heidi, Fritz Alder, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Antoine Delignat-Lavaud et al. "Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability". Proceedings of the VLDB Endowment 17, n.º 2 (outubro de 2023): 225–40. http://dx.doi.org/10.14778/3626292.3626304.
Texto completo da fonteHan, Jideng, Zhaoxin Zhang, Yuejin Du, Wei Wang e Xiuyuan Chen. "ESFuzzer: An Efficient Way to Fuzz WebAssembly Interpreter". Electronics 13, n.º 8 (15 de abril de 2024): 1498. http://dx.doi.org/10.3390/electronics13081498.
Texto completo da fonteFERRARI, GIANLUIGI, EUGENIO MOGGI e ROSARIO PUGLIESE. "MetaKlaim: a type safe multi-stage language for global computing". Mathematical Structures in Computer Science 14, n.º 3 (20 de maio de 2004): 367–95. http://dx.doi.org/10.1017/s0960129504004165.
Texto completo da fonteMitropoulos, Dimitris, e Diomidis Spinellis. "Fatal injection: a survey of modern code injection attack countermeasures". PeerJ Computer Science 3 (27 de novembro de 2017): e136. http://dx.doi.org/10.7717/peerj-cs.136.
Texto completo da fonteGourdin, Léo, Benjamin Bonneau, Sylvain Boulmé, David Monniaux e Alexandre Bérard. "Formally Verifying Optimizations with Block Simulations". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16 de outubro de 2023): 59–88. http://dx.doi.org/10.1145/3622799.
Texto completo da fonteMarkin, Dmitry Olegovich, Sergey Mikhailovich Makeev e Thaj Trung Ho. "Security threat level estimation for untrusted software based on TrustZone technology". Proceedings of the Institute for System Programming of the RAS 34, n.º 1 (2022): 35–48. http://dx.doi.org/10.15514/ispras-2022-34(1)-3.
Texto completo da fontePasupuleti, Syam Kumar. "Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code". International Journal of Cloud Applications and Computing 9, n.º 4 (outubro de 2019): 1–20. http://dx.doi.org/10.4018/ijcac.2019100101.
Texto completo da fonteMironov, Denis Dmitrievich, Daniil Alekseevich Sigalov e Maxim Petrovich Malkov. "Research into Occurrence of Insecurely-Serialized Objects in Client-Side Code of Web-Applications". Proceedings of the Institute for System Programming of the RAS 35, n.º 1 (2023): 223–36. http://dx.doi.org/10.15514/ispras-2023-35(1)-14.
Texto completo da fonteAndrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, Guido Martínez, Exequiel Rivas, Éric Tanter e Théo Winterhalter. "Securing Verified IO Programs Against Unverified Code in F*". Proceedings of the ACM on Programming Languages 8, POPL (5 de janeiro de 2024): 2226–59. http://dx.doi.org/10.1145/3632916.
Texto completo da fonteDe Nicola, Rocco, e Michele Loreti. "Modelling global computations with Klaim". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, n.º 1881 (31 de julho de 2008): 3737–45. http://dx.doi.org/10.1098/rsta.2008.0148.
Texto completo da fonteKolosick, Matthew, Shravan Narayan, Evan Johnson, Conrad Watt, Michael LeMay, Deepak Garg, Ranjit Jhala e Deian Stefan. "Isolation without taxation: near-zero-cost transitions for WebAssembly and SFI". Proceedings of the ACM on Programming Languages 6, POPL (16 de janeiro de 2022): 1–30. http://dx.doi.org/10.1145/3498688.
Texto completo da fonteLescisin, Michael, e Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security". International Journal of Systems and Software Security and Protection 9, n.º 3 (julho de 2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.
Texto completo da fonteKushwaha, Satpal Singh, Sandeep Joshi e Amit Kumar Gupta. "An efficient approach to secure smart contract of Ethereum blockchain using hybrid security analysis approach". Journal of Discrete Mathematical Sciences and Cryptography 26, n.º 5 (2023): 1499–517. http://dx.doi.org/10.47974/jdmsc-1815.
Texto completo da fonteMondal, Anupam, Shreya Gangopadhyay, Durba Chatterjee, Harishma Boyapally e Debdeep Mukhopadhyay. "PReFeR : P hysically Re lated F unction bas e d R emote Attestation Protocol". ACM Transactions on Embedded Computing Systems 22, n.º 5s (9 de setembro de 2023): 1–23. http://dx.doi.org/10.1145/3609104.
Texto completo da fonteFei, Shufan, Zheng Yan, Wenxiu Ding e Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures". ACM Computing Surveys 54, n.º 6 (julho de 2021): 1–36. http://dx.doi.org/10.1145/3456631.
Texto completo da fonteMiladinović, Danko, Adrian Milaković, Maja Vukasović, Žarko Stanisavljević e Pavle Vuletić. "Secure Multiparty Computation Using Secure Virtual Machines". Electronics 13, n.º 5 (5 de março de 2024): 991. http://dx.doi.org/10.3390/electronics13050991.
Texto completo da fonteSong, Fuyuan, Yiwei Liu, Siyao Ma, Qin Jiang, Xiang Zhang e Zhangjie Fu. "Enabling Efficient and Privacy-Preserving Task Allocation with Temporal Access Control for Mobile Crowdsensing". Electronics 12, n.º 14 (10 de julho de 2023): 3016. http://dx.doi.org/10.3390/electronics12143016.
Texto completo da fonteMercadier, Darius, Viet Sang Nguyen, Matthieu Rivain e Aleksei Udovenko. "OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 2 (12 de março de 2024): 588–629. http://dx.doi.org/10.46586/tches.v2024.i2.588-629.
Texto completo da fonteAlazzam, Farouq Ahmad Faleh, Ali Jabbar Salih, Maher Ali Moh`d Amoush e Fadiah Sami Ali Khasawneh. "The Nature of Electronic Contracts Using Blockchain Technology – Currency Bitcoin as an Example". Revista de Gestão Social e Ambiental 17, n.º 5 (4 de julho de 2023): e03330. http://dx.doi.org/10.24857/rgsa.v17n5-014.
Texto completo da fonteMekterović, Igor, Ljiljana Brkić e Marko Horvat. "Scaling Automated Programming Assessment Systems". Electronics 12, n.º 4 (13 de fevereiro de 2023): 942. http://dx.doi.org/10.3390/electronics12040942.
Texto completo da fonteMorales-Sandoval, Miguel, José A. Molina, Heidy M. Marin-Castro e Jose Luis Gonzalez-Compean. "Blockchain support for execution, monitoring and discovery of inter-organizational business processes". PeerJ Computer Science 7 (29 de setembro de 2021): e731. http://dx.doi.org/10.7717/peerj-cs.731.
Texto completo da fonteSunitha, Surarapu, Nampalli Shirisha, Batchu Teja Sai Satish, Koyalakonda Vishnu e Timmanayanapeta Sankalp. "BLOCKCHAIN-BASED ACCESS CONTROL SYSTEM FOR CLOUD STORAGE". YMER Digital 21, n.º 06 (16 de junho de 2022): 446–50. http://dx.doi.org/10.37896/ymer21.06/43.
Texto completo da fonteGuo, Zhongfu, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou e Lingwei Wang. "LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network". Entropy 25, n.º 7 (21 de junho de 2023): 966. http://dx.doi.org/10.3390/e25070966.
Texto completo da fonteXu, Yang, Guojun Wang, Jidian Yang, Ju Ren, Yaoxue Zhang e Cheng Zhang. "Towards Secure Network Computing Services for Lightweight Clients Using Blockchain". Wireless Communications and Mobile Computing 2018 (13 de novembro de 2018): 1–12. http://dx.doi.org/10.1155/2018/2051693.
Texto completo da fonteKulkarni, Pallavi, Rajashri Khanai, Dattaprasad Torse, Nalini Iyer e Gururaj Bindagi. "Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment". Cryptography 7, n.º 2 (4 de maio de 2023): 23. http://dx.doi.org/10.3390/cryptography7020023.
Texto completo da fonteAyeni, Bakare K., Junaidu B. Sahalu e Kolawole R. Adeyanju. "Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System". Journal of Computer Networks and Communications 2018 (1 de agosto de 2018): 1–10. http://dx.doi.org/10.1155/2018/8159548.
Texto completo da fonteSaraswathy, K. S., e S. S. Sujatha. "Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search". International journal of electrical and computer engineering systems 13, n.º 7 (30 de setembro de 2022): 569–75. http://dx.doi.org/10.32985/ijeces.13.7.9.
Texto completo da fonteWharton, Tracy, Emily Costello, Vincent Lafronza e Oscar Espinosa. "BARRIERS TO VACCINE UPTAKE IDENTIFIED BY COMMUNITY-BASED ORGANIZATIONS FOR INSITUTIONALLY UNDERSERVED GROUPS". Innovation in Aging 6, Supplement_1 (1 de novembro de 2022): 474–75. http://dx.doi.org/10.1093/geroni/igac059.1837.
Texto completo da fonteBirman, Ken. "Session details: Safely executing untrusted code". ACM SIGOPS Operating Systems Review 37, n.º 5 (dezembro de 2003). http://dx.doi.org/10.1145/3262203.
Texto completo da fonteVAN STRYDONCK, THOMAS, FRANK PIESSENS e DOMINIQUE DEVRIESE. "Linear capabilities for fully abstract compilation of separation-logic-verified code". Journal of Functional Programming 31 (2021). http://dx.doi.org/10.1017/s0956796821000022.
Texto completo da fonte"A Hardware Sandbox Using Processor Virtualization for Untrusted Native Code". Applied Mechanics and Materials 519-520 (fevereiro de 2014): 368–72. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.368.
Texto completo da fonteGeorges, Aïna Linn, Armaël Guéneau, Thomas Van Strydonck, Amin Timany, Alix Trieu, Dominique Devriese e Lars Birkedal. "Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code". Journal of the ACM, 14 de setembro de 2023. http://dx.doi.org/10.1145/3623510.
Texto completo da fonteJiang, Zhuhan, Jiansheng Huang e Rezina Akhter. "Protection Tiers and Their Applications for Evaluating Untrusted Code on A Linux-Based Web Server". Journal of Communications, 2015. http://dx.doi.org/10.12720/jcm.10.11.918-925.
Texto completo da fonteKristensen, Mads Darø. "Scavenger - Mobile Remote Execution". DAIMI Report Series 37, n.º 587 (1 de janeiro de 2008). http://dx.doi.org/10.7146/dpb.v37i587.7223.
Texto completo da fonteOlivieri, Luca, Luca Negrini, Vincenzo Arceri, Thomas Jensen e Fausto Spoto. "Design and Implementation of Static Analyses for Tezos Smart Contracts". Distributed Ledger Technologies: Research and Practice, 29 de janeiro de 2024. http://dx.doi.org/10.1145/3643567.
Texto completo da fonteTodo, Yosuke, e Takanori Isobe. "Hybrid Code Lifting on Space-Hard Block Ciphers". IACR Transactions on Symmetric Cryptology, 9 de setembro de 2022, 368–402. http://dx.doi.org/10.46586/tosc.v2022.i3.368-402.
Texto completo da fonteMuhammed, Younus Ameen, e Raghad Zuhair Yousif Al-Maqdici. "Robust security model utilizing 4D hyper-digital chaotic sequence for Joint-polar coding and SCMA scheme based IoT applications". Engineering Research Express, 14 de dezembro de 2023. http://dx.doi.org/10.1088/2631-8695/ad15b6.
Texto completo da fonteSchneider, Moritz, Aritra Dhar, Ivan Puddu, Kari Kostiainen e Srdjan Čapkun. "Composite Enclaves: Towards Disaggregated Trusted Execution". IACR Transactions on Cryptographic Hardware and Embedded Systems, 19 de novembro de 2021, 630–56. http://dx.doi.org/10.46586/tches.v2022.i1.630-656.
Texto completo da fonteSayar, Imen, Alexandre Bartel, Eric Bodden e Yves Le Traon. "An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities". ACM Transactions on Software Engineering and Methodology, 5 de agosto de 2022. http://dx.doi.org/10.1145/3554732.
Texto completo da fonteNagy, Roland, Krisztián Németh, Dorottya Papp e Levente Buttyán. "Rootkit Detection on Embedded IoT Devices". Acta Cybernetica, 4 de agosto de 2021. http://dx.doi.org/10.14232/actacyb.288834.
Texto completo da fonteBroby, Daniel, Andrea Bracciali e Siham Lamssaoui. "A Decentralized Marketing Model for the Online Accommodation Rental Market". Journal of Business Thought, 2 de setembro de 2022, 1–12. http://dx.doi.org/10.18311/jbt/2022/30650.
Texto completo da fonteCui, Jinhua, Shweta Shinde, Satyaki Sen, Prateek Saxena e Pinghai Yuan. "Dynamic Binary Translation for SGX Enclaves". ACM Transactions on Privacy and Security, 2 de maio de 2022. http://dx.doi.org/10.1145/3532862.
Texto completo da fonteWu Xiao-Dong e Huang Duan. "Plug-and-play discrete modulation continuous variable quantum key distribution based on non-Gaussian state-discrimination detection". Acta Physica Sinica, 2023, 0. http://dx.doi.org/10.7498/aps.72.20222253.
Texto completo da fonteLi, Shimin, Xin Wang e Rui Xue. "Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications". Computer Journal, 22 de maio de 2021. http://dx.doi.org/10.1093/comjnl/bxab042.
Texto completo da fonte