E Bauman, J Duan, KW Hamlen, Z Lin - Proceedings of the 26th …, 2023 - dl.acm.org
Renew (Rewriting Newly Executable pages after Writes) unites and extends recent advances in binary code analysis and transformation to solve a longstanding compatibility …
H Chabot, R Khoury, N Tawbi - computers & security, 2011 - Elsevier
Runtime monitors are a widely used approach to enforcing security policies. Truncation monitors are based on the idea of truncating an execution before a violation occurs. Thus …
G Katz - Model-Driven Engineering and Software Development …, 2021 - Springer
Deep neural networks (DNNs) are becoming widespread, and can often outperform manually-created systems. However, these networks are typically opaque to humans, and …
M Dam, B Jacobs, A Lundblad, F Piessens - … , Genoa, Italy, July 6-10, 2009 …, 2009 - Springer
Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program monitoring that is particularly appealing for …
Y Falcone, JC Fernandez, L Mounier - Information Systems Security: 4th …, 2008 - Springer
Runtime enforcement is a powerful technique to ensure that a program will respect a given security policy. We extend previous works on this topic in several directions. Firstly, we …
In this article, we introduce the model of finite state probabilistic monitors (FPM), which are finite state automata on infinite strings that have probabilistic transitions and an absorbing …
G Rosu - Scientific Annals of Computer Science, 2012 - info.uaic.ro
This paper addresses the problem of runtime verification from a foundational perspective, answering questions like “Is there a consensus among the various definitions of a safety …
R Khoury, N Tawbi - ACM Transactions on Information and System …, 2012 - dl.acm.org
Runtime monitoring is an increasingly popular method to ensure the safe execution of untrusted codes. Monitors observe and transform the execution of these codes, responding …
Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have …