专题:Security and Verification in Computing

This cluster of papers focuses on language-based information flow security, addressing topics such as enforceable security policies, control-flow integrity, side-channel attacks, dynamic taint analysis, and trusted execution environments. It also explores techniques for memory protection, virtualization, software diversity, and hardware security.
最新文献
Entropy Enhanced PUF-TRNG Security Core for Protecting Distributed Smart Grid Infrastructure

article Full Text OpenAlex

FreightBox Zero: Three-Layer Agent Safety Stack — Hard Gate, Five Locks, and Kernel Receipts for AI-Operated NVOCCs (v3)

article Full Text OpenAlex

STA for Physical AI: Safe-Stop Authority, Actuator Commitment, and Minimal-Risk Intervention

article Full Text OpenAlex

Signal-Time-Authority Runtime Oversight: A Pre-Commitment Controllability Framework

article Full Text OpenAlex

Graduated STA Control: Authority Governors and Runtime Deployment Architecture

article Full Text OpenAlex

Timing, Redirectability, and Runtime AI Oversight: The Sampling-Rate Hypothesis

article Full Text OpenAlex

BitMaskOS: A Capability-Native Operating System Abstraction for AI Service Meshes

article Full Text OpenAlex

BEAMFS v2: A Linux Filesystem with Electromagnetic Resilience and Reed-Solomon Recovery

article Full Text OpenAlex

Timing, Redirectability, and Runtime AI Oversight: The Sampling-Rate Hypothesis

article Full Text OpenAlex

FTRFS: Bringing Radiation-Robust Filesystem Principles to Contemporary Linux

article Full Text OpenAlex

近5年高被引文献
Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions

article Full Text OpenAlex 350 FWCI39.3707

IEEE Transactions on Dependable and Secure Computing

paratext Full Text OpenAlex 310 FWCI0

Zero Trust Architecture (ZTA): A Comprehensive Survey

article Full Text OpenAlex 291 FWCI37.3298

OpenFHE

article Full Text OpenAlex 225 FWCI27.9128

Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts

article Full Text OpenAlex 168 FWCI18.8335

Detecting Vulnerability on IoT Device Firmware: A Survey

article Full Text OpenAlex 156 FWCI21.5745

The Future of FPGA Acceleration in Datacenters and the Cloud

article Full Text OpenAlex 141 FWCI31.5166

GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis

article Full Text OpenAlex 128 FWCI41.4656

Secure Data Transmission and Trustworthiness Judgement Approaches Against Cyber-Physical Attacks in an Integrated Data-Driven Framework

article Full Text OpenAlex 122 FWCI14.7023

Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

article Full Text OpenAlex 118 FWCI22.4498