ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Research on proof-carrying code for untrusted-code security
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601335
◽
2002
◽
Cited By ~ 6
Author(s):
G. Necula
◽
P. Lee
Keyword(s):
Code Security
◽
Untrusted Code
Download Full-text
Related Documents
Cited By
References
A Neural Embedding for Source Code: Security Analysis and CWE Lists
2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
◽
10.1109/dasc-picom-cbdcom-cyberscitech49142.2020.00095
◽
2020
◽
Author(s):
Martina Saletta
◽
Claudio Ferretti
Keyword(s):
Source Code
◽
Security Analysis
◽
Code Security
Download Full-text
Source code security
ACM SIGUCCS Newsletter
◽
10.1145/382266.382431
◽
1987
◽
Vol 17
(4)
◽
pp. 26-28
Author(s):
Jon Corelis
Keyword(s):
Source Code
◽
Code Security
Download Full-text
Certificates for mobile code security
Proceedings of the 2002 ACM symposium on Applied computing - SAC '02
◽
10.1145/508791.508807
◽
2002
◽
Cited By ~ 12
Author(s):
Hock Kim Tan
◽
Luc Moreau
Keyword(s):
Mobile Code
◽
Mobile Code Security
◽
Code Security
Download Full-text
Morse Code Security
IJARCCE
◽
10.17148/ijarcce.2018.71131
◽
2018
◽
Vol 7
(11)
◽
pp. 143-145
Author(s):
Gaurav Gawade
◽
Gulam M.Khan
◽
Prof. Mrs. Vanita Gadekar
Keyword(s):
Morse Code
◽
Code Security
Download Full-text
Taxonomy of Source Code Security Defects Based on Three-Dimension-Tree
Computer and Computing Technologies in Agriculture VII - IFIP Advances in Information and Communication Technology
◽
10.1007/978-3-642-54344-9_29
◽
2014
◽
pp. 232-241
Author(s):
Zhang Yan
◽
Dong Guowei
◽
Guo Tao
◽
Yang Jianyu
Keyword(s):
Source Code
◽
Three Dimension
◽
Code Security
Download Full-text
Secure composition of untrusted code: wrappers and causality types
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856943
◽
2002
◽
Cited By ~ 14
Author(s):
P. Sewell
◽
J. Vitek
Keyword(s):
Untrusted Code
Download Full-text
Proceedings of the first ACM workshop on Secure execution of untrusted code - SecuCode '09
10.1145/1655077
◽
2009
◽
Keyword(s):
Untrusted Code
Download Full-text
Hardware-enforced fine-grained isolation of untrusted code
Proceedings of the first ACM workshop on Secure execution of untrusted code - SecuCode '09
◽
10.1145/1655077.1655082
◽
2009
◽
Cited By ~ 4
Author(s):
Eugen Leontie
◽
Gedare Bloom
◽
Bhagirath Narahari
◽
Rahul Simha
◽
Joseph Zambreno
Keyword(s):
Fine Grained
◽
Untrusted Code
Download Full-text
Pollux VMM: A Virtual Machine Monitor for Executing Untrusted Code
2009 First International Conference on Information Science and Engineering
◽
10.1109/icise.2009.835
◽
2009
◽
Author(s):
Linfeng Zhang
◽
Yan Wen
◽
Kai Du
Keyword(s):
Virtual Machine
◽
Virtual Machine Monitor
◽
Untrusted Code
Download Full-text
Protection Tiers and Their Applications for Evaluating Untrusted Code on A Linux-Based Web Server
Journal of Communications
◽
10.12720/jcm.10.11.918-925
◽
2015
◽
Cited By ~ 1
Author(s):
Zhuhan Jiang
◽
◽
Jiansheng Huang
◽
Rezina Akhter
Keyword(s):
Web Server
◽
Untrusted Code
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close