Guest Lecturer . Principles of Programming Language

نویسنده

  • DIPTIKALYAN SAHA
چکیده

Vulnerability analysis using dynamic attack graphs, dynamic binary analysis for mobile code security, incre-mental bisimulation algorithm. Development of algorithms for incremental evaluation of tabled logic programs and its application to program analysis, generation and analysis of multiple counterexamples for error cause localization, model checking security-relevant properties of sequential programs, and rule based program analysis. Development of rule-based system for detection and analysis of vulnerabilities in Intelligent Firewall system. on verification of security protocols, and phishing (duration 5 months) Teaching Assistant.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Godmar Back 280

Current research on static analysis tools for systems: developed MJ system for checking properties and implementing bug-finding analyses in Java code. Design and implementation of DataScript, an input description language that supports code generation. Published in GPCE'02. Dissertation research on runtime systems that support multiple applications. Published in OSDI'00, Usenix'00, and HotOS'99...

متن کامل

Virtual Speaking Head for Hearing Impaired Students

Developed tool is one of system tools for easier access to various scientific areas and real time interactive learning between lecturer and for hearing impaired students. There is no demand for the lecturer to know Sign Language (SL). Instead, the new software tools will perform the translation of the regular speech into SL, after which it will be transferred to the student. On the other side, ...

متن کامل

Technology Enhanced Internationalization in Higher Education, Non-Traditional Indicators

This paper describes an alternative view of the internationalization process in higher education by comparing the traditional and non-traditional indicators on how the level of internationalization is measured; additionally, barriers that exist on both sides are reviewed and discussed. As higher education institutions are very accustomed to and focused on the number of international students, i...

متن کامل

The Dys-Functional Student

Functional languages liberate students from complex syntax, complex semantics and complex memory allocation; allowing them to concentrate on problem-solving. However, functional programming is not a universal panacea. Students still have problems with language features, program concepts and the legacy of the imperative paradigm. This paper aims to assist the lecturer asked to teach a functional...

متن کامل

Preventing Injection Attacks with Syntax Embeddings A Host and Guest Language Independent Approach

Software written in one language often needs to construct sentences in another language, such as SQL queries, XML output, or shell command invocations. This is almost always done using unhygienic string manipulation, the concatenation of constants and client-supplied strings. A client can then supply specially crafted input that causes the constructed sentence to be interpreted in an unintended...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008