Siga este enlace para ver otros tipos de publicaciones sobre el tema: Untrusted Code.

Artículos de revistas sobre el tema "Untrusted Code"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Untrusted Code".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Lampson, Butler. "Making untrusted code useful." Communications of the ACM 54, no. 11 (2011): 92. http://dx.doi.org/10.1145/2018396.2018418.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Patel, Parveen, Andrew Whitaker, David Wetherall, Jay Lepreau, and Tim Stack. "Upgrading transport protocols using untrusted mobile code." ACM SIGOPS Operating Systems Review 37, no. 5 (2003): 1–14. http://dx.doi.org/10.1145/1165389.945447.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Tyler, Liam, and Ivan De Oliveira Nunes. "Untrusted Code Compartmentalization for Bare Metal Embedded Devices." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 43, no. 11 (2024): 3419–30. http://dx.doi.org/10.1109/tcad.2024.3444691.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Markov, Ilya R., Vadim A. Kulipanov, and Alexander V. Orlov. "COMPETITIVE PROGRAMMING PLATFORM AND METHODS OF SAFELY EXECUTING UNTRUSTED CODE." Technologies & Quality 65, no. 3 (2024): 67–71. http://dx.doi.org/10.34216/2587-6147-2024-3-65-67-71.

Texto completo
Resumen
The article discusses the use of information systems for holding programming Olympiads, especially in the context of executing code from untrusted sources. An analysis of existing systems designed to ensure the safe execution of tasks by Olympiad participants is conducted, and the problems faced by organisers and developers of such systems are discussed. Their shortcomings are shown, such as complexity of use, limited functionality, commercial focus. A system is proposed that can function in the internal local network of an institution, providing the ability to hold both online and offline Oly
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Sewell, Peter, та Jan Vitek. "Secure composition of untrusted code: box π, wrappers, and causality types". Journal of Computer Security 11, № 2 (2003): 135–87. http://dx.doi.org/10.3233/jcs-2003-11202.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Bugerya, A. B., V. Yu Efimov, I. I. Kulagin, V. A. Padaryan, M. A. Solovev, and A. Yu Tikhonov. "A software complex for revealing malicious behavior in untrusted binary code." Proceedings of the Institute for System Programming of the RAS 31, no. 6 (2019): 33–64. http://dx.doi.org/10.15514/ispras-2019-31(6)-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Hammond, Angus, Ricardo Almeida, Thomas Bauereiss, Brian Campbell, Ian Stark, and Peter Sewell. "Morello-Cerise: A Proof of Strong Encapsulation for the Arm Morello Capability Hardware Architecture." Proceedings of the ACM on Programming Languages 9, PLDI (2025): 1961–83. https://doi.org/10.1145/3729329.

Texto completo
Resumen
When designing new architectural security mechanisms, a key question is whether they actually provide the intended security, but this has historically been very hard to assess. One cannot gain much confidence by testing, as such mechanisms should provide protection in the presence of arbitrary unknown code. Previously, one also could not gain confidence by mechanised proof, as the scale of production instruction-set architecture (ISA) designs, many tens or hundreds of thousands of lines of specification, made that prohibitive. We focus in this paper especially on the secure encapsulation of so
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Liu, Hua Xiao, and Ying Jin. "Enumeration Based Security Behavior Model Checking Algorithm." Applied Mechanics and Materials 20-23 (January 2010): 808–13. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.808.

Texto completo
Resumen
Model Carrying Code(MCC) provides a way to safe execution of untrusted code by taking both mobile code producer and consumers into consideration, where it checks mobile code security by comparing security related program behavior model with security policies. In this paper an enumeration based algorithm to checking security related behavior with respect to security policy has been given, where security behavior has been modeled as extended context free grammar and the security policy has been specified as extended FSA. Solutions to dealing with loops and recursions have been introduced. A prog
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Howard, Heidi, Fritz Alder, Edward Ashton, et al. "Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability." Proceedings of the VLDB Endowment 17, no. 2 (2023): 225–40. http://dx.doi.org/10.14778/3626292.3626304.

Texto completo
Resumen
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential properties for trustworthy data systems. The rise of cloud computing and the growing demand for multiparty applications however means that building modern CIA systems is more challenging than ever. In response, we present the Confidential Consortium Framework (CCF), a general-purpose foundation for developing secure stateful CIA applications. CCF combines centralized compute with decentralized trust, supporting deployment on untrusted cloud infrastructure and transparent governance by mutually untru
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Han, Jideng, Zhaoxin Zhang, Yuejin Du, Wei Wang, and Xiuyuan Chen. "ESFuzzer: An Efficient Way to Fuzz WebAssembly Interpreter." Electronics 13, no. 8 (2024): 1498. http://dx.doi.org/10.3390/electronics13081498.

Texto completo
Resumen
WebAssembly code is designed to run in a sandboxed environment, such as a web browser, providing a high level of security and isolation from the underlying operating system and hardware. This enables the execution of untrusted code in a web browser without compromising the security and integrity of the user’s system. This paper discusses the challenges associated with using fuzzing tools to identify vulnerabilities or bugs in WebAssembly interpreters. Our approach, known as ESFuzzer, introduces an efficient method for fuzzing WebAssembly interpreters using an Equivalent-Statement concept and t
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

FERRARI, GIANLUIGI, EUGENIO MOGGI, and ROSARIO PUGLIESE. "MetaKlaim: a type safe multi-stage language for global computing." Mathematical Structures in Computer Science 14, no. 3 (2004): 367–95. http://dx.doi.org/10.1017/s0960129504004165.

Texto completo
Resumen
This paper describes the design and semantics of METAKLAIM, which is a higher order distributed process calculus equipped with staging mechanisms. METAKLAIM integrates METAML (an extension of SML for multi-stage programming) and KLAIM (a Kernel Language for Agents Interaction and Mobility), to permit interleaving of meta-programming activities (such as assembly and linking of code fragments), dynamic checking of security policies at administrative boundaries and ‘traditional’ computational activities on a wide area network (such as remote communication and code mobility). METAKLAIM exploits a
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Sadeer, Dheyaa Abdulameer. "PRIVACY PRESERVING ADVANCED SECURITY ON UNTRUSTED CLOUD WITH SELF BACKUP PROCESS." International Journal of Research - Granthaalayah 5, no. 4 (2017): 176–81. https://doi.org/10.5281/zenodo.570184.

Texto completo
Resumen
Cloud Storage service are frequently required for many corporate and government organizations. Most of cloud storage service providers are un-trusted, so it is not safe to keep the data in cloud for long period. Many are using cloud storage for data sharing that means it is not possible to send a big file in email, maximum 25 GB are allowed, for big files, files are uploaded in cloud storage and link is given to the data consumer. After Data consumer download the file, Data owner has to delete the file from the cloud for the security reasons, but most of time Data Owner forget to delete the fi
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Seo, Aria, Young-Tak Kim, Ji Seok Yang, YangSun Lee, and Yunsik Son. "Software Weakness Detection in Solidity Smart Contracts Using Control and Data Flow Analysis: A Novel Approach with Graph Neural Networks." Electronics 13, no. 16 (2024): 3162. http://dx.doi.org/10.3390/electronics13163162.

Texto completo
Resumen
Smart contracts on blockchain platforms are susceptible to security issues that can lead to significant financial losses. This study converts the Solidity code into abstract syntax trees and generates control flow graphs and data flow graphs. These graphs train a graph convolutional network model to detect security weaknesses. The proposed system outperforms traditional tools, achieving higher accuracy, recall, precision, and F1 scores when detecting weaknesses such as integer overflow/underflow, reentrancy, delegate call to the untrusted callee, and time-based issues. This study demonstrates
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Markin, Dmitry Olegovich, Sergey Mikhailovich Makeev, and Thaj Trung Ho. "Security threat level estimation for untrusted software based on TrustZone technology." Proceedings of the Institute for System Programming of the RAS 34, no. 1 (2022): 35–48. http://dx.doi.org/10.15514/ispras-2022-34(1)-3.

Texto completo
Resumen
The paper proposes a model for assessing the security of information processed by untrusted software from the components of the TrustZone technology. The results of vulnerability analysis of TrustZone technology implementations are presented. The structure of the trustlets security analysis tool has been developed. The paper deals with the problem of assessing the credibility of foreign-made software and hardware based on processors with the ARM architecture. The main results of the work are the classification of trustlets using their threat level assessment and the model of security threat le
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Gourdin, Léo, Benjamin Bonneau, Sylvain Boulmé, David Monniaux, and Alexandre Bérard. "Formally Verifying Optimizations with Block Simulations." Proceedings of the ACM on Programming Languages 7, OOPSLA2 (2023): 59–88. http://dx.doi.org/10.1145/3622799.

Texto completo
Resumen
CompCert (ACM Software System Award 2021) is the first industrial-strength compiler with a mechanically checked proof of correctness. Yet, CompCert remains a moderately optimizing C compiler. Indeed, some optimizations of “gcc ‍-O1” such as Lazy Code Motion (LCM) or Strength Reduction (SR) were still missing: developing these efficient optimizations together with their formal proofs remained a challenge. Cyril Six et al. have developed efficient formally verified translation validators for certifying the results of superblock schedulers and peephole optimizations. We revisit and generalize the
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Mitropoulos, Dimitris, and Diomidis Spinellis. "Fatal injection: a survey of modern code injection attack countermeasures." PeerJ Computer Science 3 (November 27, 2017): e136. http://dx.doi.org/10.7717/peerj-cs.136.

Texto completo
Resumen
With a code injection attack (CIA) an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures deve
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Pasupuleti, Syam Kumar. "Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code." International Journal of Cloud Applications and Computing 9, no. 4 (2019): 1–20. http://dx.doi.org/10.4018/ijcac.2019100101.

Texto completo
Resumen
Cloud storage allows users to store their data in the cloud to avoid local storage and management costs. Since the cloud is untrusted, the integrity of stored data in the cloud has become an issue. To address this problem, several public auditing schemes have been designed to verify integrity of the data in the cloud. However, these schemes have two drawbacks: public auditing may reveal sensitive data to verifier and does not address the data recovery problem efficiently. This article proposes a new privacy-preserving public auditing scheme with data dynamics to secure the data in the cloud ba
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Mironov, Denis Dmitrievich, Daniil Alekseevich Sigalov, and Maxim Petrovich Malkov. "Research into Occurrence of Insecurely-Serialized Objects in Client-Side Code of Web-Applications." Proceedings of the Institute for System Programming of the RAS 35, no. 1 (2023): 223–36. http://dx.doi.org/10.15514/ispras-2023-35(1)-14.

Texto completo
Resumen
This paper studies the occurrence of insecure deserialization in communication between client-side code and the server-side of a web application. Special attention was paid to serialized objects sent from JavaScript client-side code. Specific patterns of using serialized objects within the client-side JavaScript code were identified and unique classes were formulated, whose main goal is to facilitate manual and automatic analysis of web applications. A tool that detects a serialized object in the client-side code of a web page has been designed and implemented. This tool is capable of finding
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Samarth Shah and Neil Choksi. "Confidential computing for serverless workloads: Secure and scalable data processing in untrusted environments." World Journal of Advanced Engineering Technology and Sciences 14, no. 3 (2025): 086–104. https://doi.org/10.30574/wjaets.2025.14.3.0067.

Texto completo
Resumen
Confidential Computing for Serverless Workloads: Secure and Scalable Data Processing in Untrusted Environments As the adoption of serverless architectures grows, the need to address data privacy and security concerns in cloud-based environments becomes critical. Serverless workloads, by design, allow developers to focus on code without managing infrastructure, leading to operational efficiency and scalability. However, this model introduces challenges related to the trustworthiness of the cloud provider, where sensitive data may be exposed to malicious actors within the system. Confidential co
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Andrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, et al. "Securing Verified IO Programs Against Unverified Code in F*." Proceedings of the ACM on Programming Languages 8, POPL (2024): 2226–59. http://dx.doi.org/10.1145/3632916.

Texto completo
Resumen
We introduce SCIO*, a formally secure compilation framework for statically verified programs performing input-output (IO). The source language is an F* subset in which a verified program interacts with its IO-performing context via a higher-order interface that includes refinement types as well as pre- and post-conditions about past IO events. The target language is a smaller F* subset in which the compiled program is linked with an adversarial context that has an interface without refinement types, pre-conditions, or concrete post-conditions. To bridge this interface gap and make compilation
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Akavia, Adi, Meir Goldenberg, Neta Oren, and Rita Vald. "Message Authentication Code with Fast Verification over Encrypted Data and Applications." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 1092–111. https://doi.org/10.56553/popets-2025-0173.

Texto completo
Resumen
In common data analytic scenarios, data is produced by a multitude of _data producers_ (e.g., medical clinics), stored and maintained by some _data keeper_ (e.g., a centralized repository), and substantial benefit can be gained from making data accessible to a variety of _data consumers_ (e.g., researchers); however, making cleartext data accessible poses a privacy threat and may infringe on privacy regulation. Computing over data encrypted by fully homomorphic encryption (FHE) enables providing privacy guarantee together with data mining utility. To ensure that correct insights are extracted,
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

De Nicola, Rocco, and Michele Loreti. "Modelling global computations with Klaim." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, no. 1881 (2008): 3737–45. http://dx.doi.org/10.1098/rsta.2008.0148.

Texto completo
Resumen
A new area of research, known as Global Computing, is by now well established. It aims at defining new models of computation based on code and data mobility over wide-area networks with highly dynamic topologies, and at providing infrastructures to support coordination and control of components originating from different, possibly untrusted, fault-prone, malicious or selfish sources. In this paper, we present our contribution to the field of Global Computing that is centred on Kernel Language for Agents Interaction and Mobility ( Klaim ). Klaim is an experimental language specifically designed
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Kolosick, Matthew, Shravan Narayan, Evan Johnson, et al. "Isolation without taxation: near-zero-cost transitions for WebAssembly and SFI." Proceedings of the ACM on Programming Languages 6, POPL (2022): 1–30. http://dx.doi.org/10.1145/3498688.

Texto completo
Resumen
Software sandboxing or software-based fault isolation (SFI) is a lightweight approach to building secure systems out of untrusted components. Mozilla, for example, uses SFI to harden the Firefox browser by sandboxing third-party libraries, and companies like Fastly and Cloudflare use SFI to safely co-locate untrusted tenants on their edge clouds. While there have been significant efforts to optimize and verify SFI enforcement, context switching in SFI systems remains largely unexplored: almost all SFI systems use heavyweight transitions that are not only error-prone but incur significant perfo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

de Melo, Laerte Peotta, Dino Macedo Amaral, Robson de Oliveira Albuquerque, Rafael Timóteo de Sousa Júnior, Ana Lucila Sandoval Orozco, and Luis Javier García Villalba. "A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol." Cryptography 8, no. 4 (2024): 51. http://dx.doi.org/10.3390/cryptography8040051.

Texto completo
Resumen
The article presents an innovative approach for secure authentication in internet banking transactions, utilizing an Out-of-Band visual two-factor authorization protocol. With the increasing rise of cyber attacks and fraud, new security models are needed that ensure the integrity, authenticity, and confidentiality of financial transactions. The identified gap lies in the inability of traditional authentication methods, such as TANs and tokens, to provide security in untrusted terminals. The proposed solution is the Dynamic Authorization Protocol (DAP), which uses mobile devices to validate tra
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Lescisin, Michael, and Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security." International Journal of Systems and Software Security and Protection 9, no. 3 (2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.

Texto completo
Resumen
This article discusses the development of secure software by means of dynamic analysis tools. A secure software-based system should have security checks and balances integrated throughout its entire development lifecycle, including its deployment phase. Therefore, this article covers both using software security tools for testing code in development as well as monitoring code in deployment to ensure that it is operating securely. The security issues discussed in this article will be split into two categories – memory safety issues and input validation issues. Memory safety issues concern probl
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Kushwaha, Satpal Singh, Sandeep Joshi, and Amit Kumar Gupta. "An efficient approach to secure smart contract of Ethereum blockchain using hybrid security analysis approach." Journal of Discrete Mathematical Sciences and Cryptography 26, no. 5 (2023): 1499–517. http://dx.doi.org/10.47974/jdmsc-1815.

Texto completo
Resumen
The technology behind blockchain is quickly becoming one of the most crucial innovations in recent years. The Smart contracts are digital agreements, made in between two untrusted parties. Smart contracts are self-executable small piece of code that gets executed due to some predefined triggering conditions. Smart contracts store cryptocurrencies as their balances and deal in cryptocurrencies on network transactions. Because of this, smart contracts are constantly open to the possibility of being attacked. A single security vulnerability can make the smart contract very much insecure. The immu
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Mondal, Anupam, Shreya Gangopadhyay, Durba Chatterjee, Harishma Boyapally, and Debdeep Mukhopadhyay. "PReFeR : P hysically Re lated F unction bas e d R emote Attestation Protocol." ACM Transactions on Embedded Computing Systems 22, no. 5s (2023): 1–23. http://dx.doi.org/10.1145/3609104.

Texto completo
Resumen
Remote attestation is a request-response based security service that permits a trusted entity (verifier) to check the current state of an untrusted remote device (prover). The verifier initiates the attestation process by sending an attestation challenge to the prover; the prover responds with its current state, which establishes its trustworthiness. Physically Unclonable Function (PUF) offers an attractive choice for hybrid attestation schemes owing to its low overhead security guarantees. However, this comes with the limitation of secure storage of the PUF model or large challenge-response d
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Fei, Shufan, Zheng Yan, Wenxiu Ding, and Haomeng Xie. "Security Vulnerabilities of SGX and Countermeasures." ACM Computing Surveys 54, no. 6 (2021): 1–36. http://dx.doi.org/10.1145/3456631.

Texto completo
Resumen
Trusted Execution Environments (TEEs) have been widely used in many security-critical applications. The popularity of TEEs derives from its high security and trustworthiness supported by secure hardware. Intel Software Guard Extensions (SGX) is one of the most representative TEEs that creates an isolated environment on an untrusted operating system, thus providing run-time protection for the execution of security-critical code and data. However, Intel SGX is far from the acme of perfection. It has become a target of various attacks due to its security vulnerabilities. Researchers and practitio
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Miladinović, Danko, Adrian Milaković, Maja Vukasović, Žarko Stanisavljević, and Pavle Vuletić. "Secure Multiparty Computation Using Secure Virtual Machines." Electronics 13, no. 5 (2024): 991. http://dx.doi.org/10.3390/electronics13050991.

Texto completo
Resumen
The development of new processor capabilities which enable hardware-based memory encryption, capable of isolating and encrypting application code and data in memory, have led to the rise of confidential computing techniques that protect data when processed on untrusted computing resources (e.g., cloud). Before confidential computing technologies, applications that needed data-in-use protection, like outsourced or secure multiparty computation, used purely cryptographic techniques, which had a large negative impact on the processing performance. Processing data in trusted enclaves protected by
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

David, Safford, Wiseman Monty, and Dave Avani. "SEDAT: Security Enhanced Device Attestation with TPM2.0." Journal of Scientific and Engineering Research 6, no. 10 (2019): 298–309. https://doi.org/10.5281/zenodo.13348541.

Texto completo
Resumen
Remote attestation is one of the ways to verify the state of an untrusted device. Earlier research has attempted remote verification of a device’s state using hardware, software, or hybrid approaches. Majority of them have used Attestation Key as a hardware root of trust, which does not detect hardware modification or couterfiet issues. In addition, they do not have a secure communication channel between verifier and prover, which makes them susceptible to mordern security attacks. This paper presents SEDAT, a novel methodology for remote attesta- tion of the device via a security enhanc
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Dahan, Eran, Itzhak Aviv, and Michael Kiperberg. "Trust Domain Extensions Guest Fuzzing Framework for Security Vulnerability Detection." Mathematics 13, no. 11 (2025): 1879. https://doi.org/10.3390/math13111879.

Texto completo
Resumen
The Intel® Trust Domain Extensions (TDX) encrypt guest memory and minimize host interactions to provide hardware-enforced isolation for sensitive virtual machines (VMs). Software vulnerabilities in the guest OS continue to pose a serious risk even as the TDX improves security against a malicious hypervisor. We suggest a comprehensive TDX Guest Fuzzing Framework that systematically explores the guest’s code paths handling untrusted inputs. Our method uses a customized coverage-guided fuzzer to target those pathways with random input mutations following integrating static analysis to identify po
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Song, Fuyuan, Yiwei Liu, Siyao Ma, Qin Jiang, Xiang Zhang, and Zhangjie Fu. "Enabling Efficient and Privacy-Preserving Task Allocation with Temporal Access Control for Mobile Crowdsensing." Electronics 12, no. 14 (2023): 3016. http://dx.doi.org/10.3390/electronics12143016.

Texto completo
Resumen
The increasing proliferation of GPS-enabled mobile devices, including Unmanned Aerial Vehicles (UAVs), smartphones, and laptops, has resulted in a significant upsurge in the outsourcing of spatial data to cloud servers for storage and computation purposes, such as task allocation and location-based services. However, the reliance on untrusted cloud servers introduces the risk of privacy breaches, as these servers possess the ability to deduce and access users’ private information based on task content and query requirements. Existing privacy-preserving task-allocation schemes offer only coarse
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Mercadier, Darius, Viet Sang Nguyen, Matthieu Rivain, and Aleksei Udovenko. "OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (2024): 588–629. http://dx.doi.org/10.46586/tches.v2024.i2.588-629.

Texto completo
Resumen
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face potentially malicious users trying to reverse-engineer a sensitive program. Unfortunately, the state-of-the-art of pure software-based obfuscation (including white-box cryptography) is either insecure or infeasible in practice.This work introduces OBSCURE, a versatile framework for practical and cryptographically strong software obfuscation relying on
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Alazzam, Farouq Ahmad Faleh, Ali Jabbar Salih, Maher Ali Moh`d Amoush, and Fadiah Sami Ali Khasawneh. "The Nature of Electronic Contracts Using Blockchain Technology – Currency Bitcoin as an Example." Revista de Gestão Social e Ambiental 17, no. 5 (2023): e03330. http://dx.doi.org/10.24857/rgsa.v17n5-014.

Texto completo
Resumen
Purpose: This study aimed to assess the extent of the use and the safety of dealing withBitcoin through blockchain technology. Method/approach: Bitcoin model applied for electronic contracts. The method of functional-cost analysis for technical and economic analysis of system development for NFT creation is used in work. Theoretical framework: Bitcoin is a currency that depends on modern technological techniques with many advantages because they are used to send and receive money over the Internet and can be used in legitimate and illegal businesses. Therefore, quick international measures mus
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Mekterović, Igor, Ljiljana Brkić, and Marko Horvat. "Scaling Automated Programming Assessment Systems." Electronics 12, no. 4 (2023): 942. http://dx.doi.org/10.3390/electronics12040942.

Texto completo
Resumen
The first automated assessment of student programs was reported more than 60 years ago, but this topic remains relevant and highly topical among computer science researchers and teachers. In the last decade, several factors have contributed to the popularity of this approach, such as the development of massive online courses, where large numbers of students can hardly be assessed manually, the COVID-19 pandemic with a strong online presence and physical relocation of students, and the ever-increasing shortage of personnel in the field CS. Modern Automated Programming Assessment Systems (APASs)
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Krastev, Aleksandar, Nikola Samardzic, Simon Langowski, Srinivas Devadas, and Daniel Sanchez. "A Tensor Compiler with Automatic Data Packing for Simple and Efficient Fully Homomorphic Encryption." Proceedings of the ACM on Programming Languages 8, PLDI (2024): 126–50. http://dx.doi.org/10.1145/3656382.

Texto completo
Resumen
Fully Homomorphic Encryption (FHE) enables computing on encrypted data, letting clients securely offload computation to untrusted servers. While enticing, FHE has two key challenges that limit its applicability: it has high performance overheads (10,000× over unencrypted computation) and it is extremely hard to program. Recent hardware accelerators and algorithmic improvements have reduced FHE’s overheads and enabled large applications to run under FHE. These large applications exacerbate FHE’s programmability challenges. Writing FHE programs directly is hard because FHE schemes expose a restr
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Morales-Sandoval, Miguel, José A. Molina, Heidy M. Marin-Castro, and Jose Luis Gonzalez-Compean. "Blockchain support for execution, monitoring and discovery of inter-organizational business processes." PeerJ Computer Science 7 (September 29, 2021): e731. http://dx.doi.org/10.7717/peerj-cs.731.

Texto completo
Resumen
In an Inter-Organizational Business Process (IOBP), independent organizations (collaborators) exchange messages to perform business transactions. With process mining, the collaborators could know what they are actually doing from process execution data and take actions for improving the underlying business process. However, process mining assumes that the knowledge of the entire process is available, something that is difficult to achieve in IOBPs since process execution data generally is not shared among the collaborating entities due to regulations and confidentiality policies (exposure of c
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Sunitha, Surarapu, Nampalli Shirisha, Batchu Teja Sai Satish, Koyalakonda Vishnu, and Timmanayanapeta Sankalp. "BLOCKCHAIN-BASED ACCESS CONTROL SYSTEM FOR CLOUD STORAGE." YMER Digital 21, no. 06 (2022): 446–50. http://dx.doi.org/10.37896/ymer21.06/43.

Texto completo
Resumen
In this paper, we present a model of a multi-client framework for access control to datasets put away in an untrusted cloud climate. Distributed storage like some other untrusted climate needs the capacity to get share data. Our methodology gives an entrance command over the information put away in the cloud the supplier investment. The fundamental device of the access control instrument is a ciphertext-strategy trait-based encryption plot with dynamic credits. Utilizing a blockchain-based decentralized record, our framework gives a permanent log of all significant security occasions, for exam
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Guo, Zhongfu, Xinsheng Ji, Wei You, et al. "LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network." Entropy 25, no. 7 (2023): 966. http://dx.doi.org/10.3390/e25070966.

Texto completo
Resumen
The increasing demand for end-to-end low-latency and high-reliability transmissions between edge computing nodes and user elements in 5G Advance edge networks has brought new challenges to the transmission of data. In response, this paper proposes LERMS, a packet-level encoding transmission scheme designed for untrusted 5GA edge networks that may encounter malicious transmission situations such as data tampering, discarding, and eavesdropping. LERMS achieves resiliency against such attacks by using 5GA Protocol data unit (PDU) coded Concurrent Multipath Transfer (CMT) based on Lagrangian inter
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Xu, Yang, Guojun Wang, Jidian Yang, Ju Ren, Yaoxue Zhang, and Cheng Zhang. "Towards Secure Network Computing Services for Lightweight Clients Using Blockchain." Wireless Communications and Mobile Computing 2018 (November 13, 2018): 1–12. http://dx.doi.org/10.1155/2018/2051693.

Texto completo
Resumen
The emerging network computing technologies have significantly extended the abilities of the resource-constrained IoT devices through the network-based service sharing techniques. However, such a flexible and scalable service provisioning paradigm brings increased security risks to terminals due to the untrustworthy exogenous service codes loading from the open network. Many existing security approaches are unsuitable for IoT environments due to the high difficulty of maintenance or the dependencies upon extra resources like specific hardware. Fortunately, the rise of blockchain technology has
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Hall, Kathryn, Matt Andrews, Keeva Connolly, et al. "The Australian Reference Genome Atlas (ARGA): Finding, sharing and reusing Australian genomics data in an occurrence-driven context." Biodiversity Information Science and Standards 7 (September 6, 2023): e112129. https://doi.org/10.3897/biss.7.112129.

Texto completo
Resumen
Fundamental to the capacity of Australia's 15,000 biosciences researchers to answer questions in taxonomy, phylogeny, evolution, conservation, and applied fields like crop improvement and biosecurity, is access to trusted genomics (and genetics) datasets. Historically, researchers turned to single points of origin, like GenBank (part of the United States' National Center for Biotechnology Information), to find the reference or comparative data they needed, but the rapidity of data generation using next-gen methods, and the enormous size and diversity of datasets derived from next-gen sequencin
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Kulkarni, Pallavi, Rajashri Khanai, Dattaprasad Torse, Nalini Iyer, and Gururaj Bindagi. "Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment." Cryptography 7, no. 2 (2023): 23. http://dx.doi.org/10.3390/cryptography7020023.

Texto completo
Resumen
The cloud provides on-demand, high-quality services to its users without the burden of managing hardware and software. Though the users benefit from the remote services provided by the cloud, they do not have their personal data in their physical possession. This certainly poses new security threats for personal and confidential data, bringing the focus back on trusting the use of the cloud for sensitive data. The benefits of the cloud outweigh the concerns raised earlier, and with an increase in cloud usage, it becomes more important for security services to evolve in order to address the eve
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Ayeni, Bakare K., Junaidu B. Sahalu, and Kolawole R. Adeyanju. "Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System." Journal of Computer Networks and Communications 2018 (August 1, 2018): 1–10. http://dx.doi.org/10.1155/2018/8159548.

Texto completo
Resumen
With improvement in computing and technological advancements, web-based applications are now ubiquitous on the Internet. However, these web applications are becoming prone to vulnerabilities which have led to theft of confidential information, data loss, and denial of data access in the course of information transmission. Cross-site scripting (XSS) is a form of web security attack which involves the injection of malicious codes into web applications from untrusted sources. Interestingly, recent research studies on the web application security centre focus on attack prevention and mechanisms fo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Saraswathy, K. S., and S. S. Sujatha. "Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search." International journal of electrical and computer engineering systems 13, no. 7 (2022): 569–75. http://dx.doi.org/10.32985/ijeces.13.7.9.

Texto completo
Resumen
The security and privacy issues regarding outsourcing data have risen significantly as cloud computing has grown in demand. Consequently, since data management has been delegated to an untrusted cloud server in the data outsourcing phase, data access control has been identified as a major problem in cloud storage systems. To overcome this problem, in this paper, the access control of cloud storage using an Attribute-Based Access Control (ABAC) approach is utilized. First, the data must be stored in the cloud and security must be strong for the user to access the data. This model takes into con
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Wharton, Tracy, Emily Costello, Vincent Lafronza, and Oscar Espinosa. "BARRIERS TO VACCINE UPTAKE IDENTIFIED BY COMMUNITY-BASED ORGANIZATIONS FOR INSITUTIONALLY UNDERSERVED GROUPS." Innovation in Aging 6, Supplement_1 (2022): 474–75. http://dx.doi.org/10.1093/geroni/igac059.1837.

Texto completo
Resumen
Abstract Through a competitive proposal process for a recent funding opportunity, 38 community based organizations submitted proposals that addressed vaccine hesitancy among adults who are members of racial or ethnic minority communities. Proposals were required to include discussion of barriers identified in the community of focus and evidence to support all assertions. Submissions ranged from single employee projects to large collaborative networks, and were submitted from all regions of the US, including both tribal and territorial areas, including more than 45 ethnic and language groups. B
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Sharma, Akshita, Ayush Anand Gupta, and Navyaa Prabhakar. "TrustSeal Recogonizing Untrusted Materials by Blockchain Technology." International Journal of Innovative Science and Research Technology, July 16, 2025, 3207–12. https://doi.org/10.38124/ijisrt/25jun1856.

Texto completo
Resumen
The Proliferation of many products in the market causing problems to generate counterfeiting of products. These products are merely low-quality counterfeits of a certain brand. However, to resolve this issue many methods have been adopted to prevent the proliferation of counterfeit products such as RFID tags, Artificial Intelligence, Machine Learning etc. Nevertheless, the disadvantages of such methods are severe Ex: QR codes may be copied from QR codes that may be from real products to fake ones, and AI&ML must have high computational power. Fake products are a huge problem for companies
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Birman, Ken. "Session details: Safely executing untrusted code." ACM SIGOPS Operating Systems Review 37, no. 5 (2003). http://dx.doi.org/10.1145/3262203.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

VAN STRYDONCK, THOMAS, FRANK PIESSENS, and DOMINIQUE DEVRIESE. "Linear capabilities for fully abstract compilation of separation-logic-verified code." Journal of Functional Programming 31 (2021). http://dx.doi.org/10.1017/s0956796821000022.

Texto completo
Resumen
Abstract Separation logic is a powerful program logic for the static modular verification of imperative programs. However, dynamic checking of separation logic contracts on the boundaries between verified and untrusted modules is hard because it requires one to enforce (among other things) that outcalls from a verified to an untrusted module do not access memory resources currently owned by the verified module. This paper proposes an approach to dynamic contract checking by relying on support for capabilities, a well-studied form of unforgeable memory pointers that enables fine-grained, effici
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

"A Hardware Sandbox Using Processor Virtualization for Untrusted Native Code." Applied Mechanics and Materials 519-520 (February 2014): 368–72. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.368.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Georges, Aïna Linn, Armaël Guéneau, Thomas Van Strydonck, et al. "Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code." Journal of the ACM, September 14, 2023. http://dx.doi.org/10.1145/3623510.

Texto completo
Resumen
A capability machine is a type of CPU allowing fine-grained privilege separation using capabilities , machine words that represent certain kinds of authority. We present a mathematical model and accompanying proof methods that can be used for formal verification of functional correctness of programs running on a capability machine, even when they invoke and are invoked by unknown (and possibly malicious) code. We use a program logic called Cerise for reasoning about known code, and an associated logical relation, for reasoning about unknown code. The logical relation formally captures the capa
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!