Journal articles on the topic 'Untrusted Code'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Untrusted Code.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lampson, Butler. "Making untrusted code useful." Communications of the ACM 54, no. 11 (2011): 92. http://dx.doi.org/10.1145/2018396.2018418.
Full textPatel, Parveen, Andrew Whitaker, David Wetherall, Jay Lepreau, and Tim Stack. "Upgrading transport protocols using untrusted mobile code." ACM SIGOPS Operating Systems Review 37, no. 5 (2003): 1–14. http://dx.doi.org/10.1145/1165389.945447.
Full textTyler, Liam, and Ivan De Oliveira Nunes. "Untrusted Code Compartmentalization for Bare Metal Embedded Devices." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 43, no. 11 (2024): 3419–30. http://dx.doi.org/10.1109/tcad.2024.3444691.
Full textMarkov, Ilya R., Vadim A. Kulipanov, and Alexander V. Orlov. "COMPETITIVE PROGRAMMING PLATFORM AND METHODS OF SAFELY EXECUTING UNTRUSTED CODE." Technologies & Quality 65, no. 3 (2024): 67–71. http://dx.doi.org/10.34216/2587-6147-2024-3-65-67-71.
Full textSewell, Peter, та Jan Vitek. "Secure composition of untrusted code: box π, wrappers, and causality types". Journal of Computer Security 11, № 2 (2003): 135–87. http://dx.doi.org/10.3233/jcs-2003-11202.
Full textBugerya, A. B., V. Yu Efimov, I. I. Kulagin, V. A. Padaryan, M. A. Solovev, and A. Yu Tikhonov. "A software complex for revealing malicious behavior in untrusted binary code." Proceedings of the Institute for System Programming of the RAS 31, no. 6 (2019): 33–64. http://dx.doi.org/10.15514/ispras-2019-31(6)-3.
Full textHammond, Angus, Ricardo Almeida, Thomas Bauereiss, Brian Campbell, Ian Stark, and Peter Sewell. "Morello-Cerise: A Proof of Strong Encapsulation for the Arm Morello Capability Hardware Architecture." Proceedings of the ACM on Programming Languages 9, PLDI (2025): 1961–83. https://doi.org/10.1145/3729329.
Full textLiu, Hua Xiao, and Ying Jin. "Enumeration Based Security Behavior Model Checking Algorithm." Applied Mechanics and Materials 20-23 (January 2010): 808–13. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.808.
Full textHoward, Heidi, Fritz Alder, Edward Ashton, et al. "Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability." Proceedings of the VLDB Endowment 17, no. 2 (2023): 225–40. http://dx.doi.org/10.14778/3626292.3626304.
Full textHan, Jideng, Zhaoxin Zhang, Yuejin Du, Wei Wang, and Xiuyuan Chen. "ESFuzzer: An Efficient Way to Fuzz WebAssembly Interpreter." Electronics 13, no. 8 (2024): 1498. http://dx.doi.org/10.3390/electronics13081498.
Full textFERRARI, GIANLUIGI, EUGENIO MOGGI, and ROSARIO PUGLIESE. "MetaKlaim: a type safe multi-stage language for global computing." Mathematical Structures in Computer Science 14, no. 3 (2004): 367–95. http://dx.doi.org/10.1017/s0960129504004165.
Full textSadeer, Dheyaa Abdulameer. "PRIVACY PRESERVING ADVANCED SECURITY ON UNTRUSTED CLOUD WITH SELF BACKUP PROCESS." International Journal of Research - Granthaalayah 5, no. 4 (2017): 176–81. https://doi.org/10.5281/zenodo.570184.
Full textSeo, Aria, Young-Tak Kim, Ji Seok Yang, YangSun Lee, and Yunsik Son. "Software Weakness Detection in Solidity Smart Contracts Using Control and Data Flow Analysis: A Novel Approach with Graph Neural Networks." Electronics 13, no. 16 (2024): 3162. http://dx.doi.org/10.3390/electronics13163162.
Full textMarkin, Dmitry Olegovich, Sergey Mikhailovich Makeev, and Thaj Trung Ho. "Security threat level estimation for untrusted software based on TrustZone technology." Proceedings of the Institute for System Programming of the RAS 34, no. 1 (2022): 35–48. http://dx.doi.org/10.15514/ispras-2022-34(1)-3.
Full textGourdin, Léo, Benjamin Bonneau, Sylvain Boulmé, David Monniaux, and Alexandre Bérard. "Formally Verifying Optimizations with Block Simulations." Proceedings of the ACM on Programming Languages 7, OOPSLA2 (2023): 59–88. http://dx.doi.org/10.1145/3622799.
Full textMitropoulos, Dimitris, and Diomidis Spinellis. "Fatal injection: a survey of modern code injection attack countermeasures." PeerJ Computer Science 3 (November 27, 2017): e136. http://dx.doi.org/10.7717/peerj-cs.136.
Full textPasupuleti, Syam Kumar. "Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code." International Journal of Cloud Applications and Computing 9, no. 4 (2019): 1–20. http://dx.doi.org/10.4018/ijcac.2019100101.
Full textMironov, Denis Dmitrievich, Daniil Alekseevich Sigalov, and Maxim Petrovich Malkov. "Research into Occurrence of Insecurely-Serialized Objects in Client-Side Code of Web-Applications." Proceedings of the Institute for System Programming of the RAS 35, no. 1 (2023): 223–36. http://dx.doi.org/10.15514/ispras-2023-35(1)-14.
Full textSamarth Shah and Neil Choksi. "Confidential computing for serverless workloads: Secure and scalable data processing in untrusted environments." World Journal of Advanced Engineering Technology and Sciences 14, no. 3 (2025): 086–104. https://doi.org/10.30574/wjaets.2025.14.3.0067.
Full textAndrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, et al. "Securing Verified IO Programs Against Unverified Code in F*." Proceedings of the ACM on Programming Languages 8, POPL (2024): 2226–59. http://dx.doi.org/10.1145/3632916.
Full textAkavia, Adi, Meir Goldenberg, Neta Oren, and Rita Vald. "Message Authentication Code with Fast Verification over Encrypted Data and Applications." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 1092–111. https://doi.org/10.56553/popets-2025-0173.
Full textDe Nicola, Rocco, and Michele Loreti. "Modelling global computations with Klaim." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, no. 1881 (2008): 3737–45. http://dx.doi.org/10.1098/rsta.2008.0148.
Full textKolosick, Matthew, Shravan Narayan, Evan Johnson, et al. "Isolation without taxation: near-zero-cost transitions for WebAssembly and SFI." Proceedings of the ACM on Programming Languages 6, POPL (2022): 1–30. http://dx.doi.org/10.1145/3498688.
Full textde Melo, Laerte Peotta, Dino Macedo Amaral, Robson de Oliveira Albuquerque, Rafael Timóteo de Sousa Júnior, Ana Lucila Sandoval Orozco, and Luis Javier García Villalba. "A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol." Cryptography 8, no. 4 (2024): 51. http://dx.doi.org/10.3390/cryptography8040051.
Full textLescisin, Michael, and Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security." International Journal of Systems and Software Security and Protection 9, no. 3 (2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.
Full textKushwaha, Satpal Singh, Sandeep Joshi, and Amit Kumar Gupta. "An efficient approach to secure smart contract of Ethereum blockchain using hybrid security analysis approach." Journal of Discrete Mathematical Sciences and Cryptography 26, no. 5 (2023): 1499–517. http://dx.doi.org/10.47974/jdmsc-1815.
Full textMondal, Anupam, Shreya Gangopadhyay, Durba Chatterjee, Harishma Boyapally, and Debdeep Mukhopadhyay. "PReFeR : P hysically Re lated F unction bas e d R emote Attestation Protocol." ACM Transactions on Embedded Computing Systems 22, no. 5s (2023): 1–23. http://dx.doi.org/10.1145/3609104.
Full textFei, Shufan, Zheng Yan, Wenxiu Ding, and Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures." ACM Computing Surveys 54, no. 6 (2021): 1–36. http://dx.doi.org/10.1145/3456631.
Full textMiladinović, Danko, Adrian Milaković, Maja Vukasović, Žarko Stanisavljević, and Pavle Vuletić. "Secure Multiparty Computation Using Secure Virtual Machines." Electronics 13, no. 5 (2024): 991. http://dx.doi.org/10.3390/electronics13050991.
Full textDavid, Safford, Wiseman Monty, and Dave Avani. "SEDAT: Security Enhanced Device Attestation with TPM2.0." Journal of Scientific and Engineering Research 6, no. 10 (2019): 298–309. https://doi.org/10.5281/zenodo.13348541.
Full textDahan, Eran, Itzhak Aviv, and Michael Kiperberg. "Trust Domain Extensions Guest Fuzzing Framework for Security Vulnerability Detection." Mathematics 13, no. 11 (2025): 1879. https://doi.org/10.3390/math13111879.
Full textSong, Fuyuan, Yiwei Liu, Siyao Ma, Qin Jiang, Xiang Zhang, and Zhangjie Fu. "Enabling Efficient and Privacy-Preserving Task Allocation with Temporal Access Control for Mobile Crowdsensing." Electronics 12, no. 14 (2023): 3016. http://dx.doi.org/10.3390/electronics12143016.
Full textMercadier, Darius, Viet Sang Nguyen, Matthieu Rivain, and Aleksei Udovenko. "OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (2024): 588–629. http://dx.doi.org/10.46586/tches.v2024.i2.588-629.
Full textAlazzam, Farouq Ahmad Faleh, Ali Jabbar Salih, Maher Ali Moh`d Amoush, and Fadiah Sami Ali Khasawneh. "The Nature of Electronic Contracts Using Blockchain Technology – Currency Bitcoin as an Example." Revista de Gestão Social e Ambiental 17, no. 5 (2023): e03330. http://dx.doi.org/10.24857/rgsa.v17n5-014.
Full textMekterović, Igor, Ljiljana Brkić, and Marko Horvat. "Scaling Automated Programming Assessment Systems." Electronics 12, no. 4 (2023): 942. http://dx.doi.org/10.3390/electronics12040942.
Full textKrastev, Aleksandar, Nikola Samardzic, Simon Langowski, Srinivas Devadas, and Daniel Sanchez. "A Tensor Compiler with Automatic Data Packing for Simple and Efficient Fully Homomorphic Encryption." Proceedings of the ACM on Programming Languages 8, PLDI (2024): 126–50. http://dx.doi.org/10.1145/3656382.
Full textMorales-Sandoval, Miguel, José A. Molina, Heidy M. Marin-Castro, and Jose Luis Gonzalez-Compean. "Blockchain support for execution, monitoring and discovery of inter-organizational business processes." PeerJ Computer Science 7 (September 29, 2021): e731. http://dx.doi.org/10.7717/peerj-cs.731.
Full textSunitha, Surarapu, Nampalli Shirisha, Batchu Teja Sai Satish, Koyalakonda Vishnu, and Timmanayanapeta Sankalp. "BLOCKCHAIN-BASED ACCESS CONTROL SYSTEM FOR CLOUD STORAGE." YMER Digital 21, no. 06 (2022): 446–50. http://dx.doi.org/10.37896/ymer21.06/43.
Full textGuo, Zhongfu, Xinsheng Ji, Wei You, et al. "LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network." Entropy 25, no. 7 (2023): 966. http://dx.doi.org/10.3390/e25070966.
Full textXu, Yang, Guojun Wang, Jidian Yang, Ju Ren, Yaoxue Zhang, and Cheng Zhang. "Towards Secure Network Computing Services for Lightweight Clients Using Blockchain." Wireless Communications and Mobile Computing 2018 (November 13, 2018): 1–12. http://dx.doi.org/10.1155/2018/2051693.
Full textHall, Kathryn, Matt Andrews, Keeva Connolly, et al. "The Australian Reference Genome Atlas (ARGA): Finding, sharing and reusing Australian genomics data in an occurrence-driven context." Biodiversity Information Science and Standards 7 (September 6, 2023): e112129. https://doi.org/10.3897/biss.7.112129.
Full textKulkarni, Pallavi, Rajashri Khanai, Dattaprasad Torse, Nalini Iyer, and Gururaj Bindagi. "Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment." Cryptography 7, no. 2 (2023): 23. http://dx.doi.org/10.3390/cryptography7020023.
Full textAyeni, Bakare K., Junaidu B. Sahalu, and Kolawole R. Adeyanju. "Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System." Journal of Computer Networks and Communications 2018 (August 1, 2018): 1–10. http://dx.doi.org/10.1155/2018/8159548.
Full textSaraswathy, K. S., and S. S. Sujatha. "Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search." International journal of electrical and computer engineering systems 13, no. 7 (2022): 569–75. http://dx.doi.org/10.32985/ijeces.13.7.9.
Full textWharton, Tracy, Emily Costello, Vincent Lafronza, and Oscar Espinosa. "BARRIERS TO VACCINE UPTAKE IDENTIFIED BY COMMUNITY-BASED ORGANIZATIONS FOR INSITUTIONALLY UNDERSERVED GROUPS." Innovation in Aging 6, Supplement_1 (2022): 474–75. http://dx.doi.org/10.1093/geroni/igac059.1837.
Full textSharma, Akshita, Ayush Anand Gupta, and Navyaa Prabhakar. "TrustSeal Recogonizing Untrusted Materials by Blockchain Technology." International Journal of Innovative Science and Research Technology, July 16, 2025, 3207–12. https://doi.org/10.38124/ijisrt/25jun1856.
Full textBirman, Ken. "Session details: Safely executing untrusted code." ACM SIGOPS Operating Systems Review 37, no. 5 (2003). http://dx.doi.org/10.1145/3262203.
Full textVAN STRYDONCK, THOMAS, FRANK PIESSENS, and DOMINIQUE DEVRIESE. "Linear capabilities for fully abstract compilation of separation-logic-verified code." Journal of Functional Programming 31 (2021). http://dx.doi.org/10.1017/s0956796821000022.
Full text"A Hardware Sandbox Using Processor Virtualization for Untrusted Native Code." Applied Mechanics and Materials 519-520 (February 2014): 368–72. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.368.
Full textGeorges, Aïna Linn, Armaël Guéneau, Thomas Van Strydonck, et al. "Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code." Journal of the ACM, September 14, 2023. http://dx.doi.org/10.1145/3623510.
Full text