Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Download malware? no, thanks: how formal methods can block update attacks
In mobile malware landscape there are many techniques to inject malicious payload in a
trusted application: one of the most common is represented by the so-called update attack …
trusted application: one of the most common is represented by the so-called update attack …
Evaluating model checking for cyber threats code obfuscation identification
Code obfuscation is a set of transformations that make code programs harder to understand.
The goal of code obfuscation is to make reverse engineering of programs infeasible, while …
The goal of code obfuscation is to make reverse engineering of programs infeasible, while …
Efficient type inference for secure information flow
This paper describes the design, analysis, and implementation of an efficient algorithm for
information flow analysis expressed using a type system. Given a program and an …
information flow analysis expressed using a type system. Given a program and an …
Secure information flow by model checking pushdown system
C Sun, L Tang, Z Chen - 2009 Symposia and Workshops on …, 2009 - ieeexplore.ieee.org
We propose an approach on model checking information flow for imperative language with
procedures. We characterize our model with pushdown system, which has a stack of …
procedures. We characterize our model with pushdown system, which has a stack of …
Probabilistic model checking applied to autonomous spacecraft reconfiguration
Formal verification techniques are necessary to demonstrate the completeness, the
correctness, and the consistency in implementing spacecraft model-based autonomy …
correctness, and the consistency in implementing spacecraft model-based autonomy …
Application of equivalence checking in a loan origination process in banking industry
A Santone, V Intilangelo… - 2013 Workshops on …, 2013 - ieeexplore.ieee.org
Equivalence checking is traditionally applied to computer system design. It is a promising
formal technique for the improvement of software quality. However, it requires detailed …
formal technique for the improvement of software quality. However, it requires detailed …
Download malware? No, thanks
AnserverBot✓ AnserverBot malicious behavior is embedded into the host app at installation
time, ie, the malicious payload is not downloaded from a remote location but it is stored in an …
time, ie, the malicious payload is not downloaded from a remote location but it is stored in an …
Efficient formal verification in banking processes
A Santone, V Intilangelo… - 2013 IEEE Ninth World …, 2013 - ieeexplore.ieee.org
Model checking is a very useful method to verify concurrent and distributed systems which is
traditionally applied to computer system design. We examine the applicability of model …
traditionally applied to computer system design. We examine the applicability of model …
[PDF][PDF] Identifying Insecure Features in Android Applications using Model Checking.
Nowadays Android is the most widespread operating system. This is the reason why
malware writers target it. Both researchers and commercial antimalware provide several …
malware writers target it. Both researchers and commercial antimalware provide several …
Instruction-level security ty** by abstract interpretation
N De Francesco, L Martini - International Journal of Information Security, 2007 - Springer
We present a method based on abstract interpretation to check secure information flow in
programs with dynamic structures where input and output channels are associated with …
programs with dynamic structures where input and output channels are associated with …