Reflection as a mechanism for software integrity verification

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sound Verification Techniques for Developing High-Integrity Medical Device Software

Embedded software in medical devices is increasing in content and complexity. Traditional software verification and testing methods may not provide the optimum solution. This paper discusses the application of sound verification techniques in the development of high integrity medical device software. Specifically, this paper will explore the application of formal methods based Abstract Interpre...

متن کامل

Oblivious Hashing: A Stealthy Software Integrity Verification Primitive

We describe a novel software verification primitive called Oblivious Hashing. Unlike previous techniques that mainly verify the static shape of code, this primitive allows implicit computation of a hash value based on the actual execution (i.e., space-time history of computation) of the code. We also discuss its applications in local software tamper resistance and remote code authentication.

متن کامل

Fault-tolerant Mechanism for Cloud Storage System with Integrity Verification Mechanism

A self-adaption fault-tolerant mechanism based on access frequency (SFMAF) is proposed for the cloud storage platform, wherein this mechanism aims at adopting the approximate LRU (Least Recently Used) algorithm to maintain a file access frequency table in order to self-adaptively adjust the fault-tolerant mode. Specifically, the replica redundancy mechanism is adopted in SFMAF for the frequentl...

متن کامل

Integrity verification for XML data

The success of the Internet has made the communication very easy between parties and XML is one of the most used standard for information representation and exchange. A huge amount of data is crossing the Internet on the daily basis. Since the Internet is an unreliable network, XML data can be easily captured and tampered by unauthorized users. This study is proposing a scheme that uses fragile...

متن کامل

Connectivity as a Measure of Power System Integrity

Measures of network structural integrity useful in the analysis and synthesis of power systems are discussed. Signal flow methodology is applied to derive an expression for the paths between sources and sinks in a power network. Connectivity and reach ability properties of the network are obtained using the minors of a modified connectivity matrix. Node-connectivity, branch connectivity and mix...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Information and System Security

سال: 2000

ISSN: 1094-9224,1557-7406

DOI: 10.1145/353323.353383