Reflection as a mechanism for software integrity verification
نویسندگان
چکیده
منابع مشابه
Sound Verification Techniques for Developing High-Integrity Medical Device Software
Embedded software in medical devices is increasing in content and complexity. Traditional software verification and testing methods may not provide the optimum solution. This paper discusses the application of sound verification techniques in the development of high integrity medical device software. Specifically, this paper will explore the application of formal methods based Abstract Interpre...
متن کاملOblivious Hashing: A Stealthy Software Integrity Verification Primitive
We describe a novel software verification primitive called Oblivious Hashing. Unlike previous techniques that mainly verify the static shape of code, this primitive allows implicit computation of a hash value based on the actual execution (i.e., space-time history of computation) of the code. We also discuss its applications in local software tamper resistance and remote code authentication.
متن کاملFault-tolerant Mechanism for Cloud Storage System with Integrity Verification Mechanism
A self-adaption fault-tolerant mechanism based on access frequency (SFMAF) is proposed for the cloud storage platform, wherein this mechanism aims at adopting the approximate LRU (Least Recently Used) algorithm to maintain a file access frequency table in order to self-adaptively adjust the fault-tolerant mode. Specifically, the replica redundancy mechanism is adopted in SFMAF for the frequentl...
متن کاملIntegrity verification for XML data
The success of the Internet has made the communication very easy between parties and XML is one of the most used standard for information representation and exchange. A huge amount of data is crossing the Internet on the daily basis. Since the Internet is an unreliable network, XML data can be easily captured and tampered by unauthorized users. This study is proposing a scheme that uses fragile...
متن کاملConnectivity as a Measure of Power System Integrity
Measures of network structural integrity useful in the analysis and synthesis of power systems are discussed. Signal flow methodology is applied to derive an expression for the paths between sources and sinks in a power network. Connectivity and reach ability properties of the network are obtained using the minors of a modified connectivity matrix. Node-connectivity, branch connectivity and mix...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Information and System Security
سال: 2000
ISSN: 1094-9224,1557-7406
DOI: 10.1145/353323.353383