Search For:

Displaying 1-11 out of 11 total
Book Reviews
Found in: Queue
By Matt Zandstra, Robert Martin, Matt Zandstra, Matt Zandstra, Robert Martin, Robert Martin
Issue Date:February 2009
pp. 1-2
Can code ever be too terse? The designer of the K and Q languages discusses this question and many more with Queue editorial board member Bryan Cantrill.
     
Dealing with Dates: Solutions for the Year 2000
Found in: Computer
By Robert A. Martin
Issue Date:March 1997
pp. 44-51
<p>The Y2K problem is real, and it has attracted intense media attention and aggressive vendor response. For whatever reason-- whether they wanted to save precious memory in an era when memory was incredibly expensive, or because they didn't expect s...
 
A Quantitative, Experimental Approach to Measuring Processor Side-Channel Security
Found in: IEEE Micro
By John Demme,Robert Martin,Adam Waksman,Simha Sethumadhavan
Issue Date:May 2013
pp. 68-77
User inputs tend to change the execution characteristics of applications including their interactions with cache, network, storage, and other systems. Many attacks have exploited the observable side effects of these execution characteristics to expose sens...
 
The Software Industry's
Found in: IEEE Security & Privacy
By Robert A. Martin,Steven M. Christey
Issue Date:May 2012
pp. 24-31
With water, we trust that qualities harmful to its intended use aren't present. To avoid a regulatory solution to problems with contaminants that endanger software's intended use, the industry needs to implement processes and technical methods for examinin...
 
Managing Vulnerabilities in Networked Systems
Found in: Computer
By Robert A. Martin
Issue Date:November 2001
pp. 32-38
<p>Most organizations recognize the importance of cyber security and are implementing various forms of protection. However, many are failing to find and fix known security problems in the software packages they use as the building blocks of their net...
 
Year 2000 Compliance: A Discussion on Compliance Certification
Found in: Computer Software and Applications Conference, Annual International
By Robert A. Martin
Issue Date:August 1997
pp. 283
One of the greatest risks facing us with Year 2000 problem, is that some groups or organizations may not fully understand the various nuances of the problem and will therefore accidentally overlook important issues in their Year 2000 finding, fixing, and t...
 
TimeWarp: rethinking timekeeping and performance monitoring mechanisms to mitigate side-channel attacks
Found in: Proceedings of the 39th Annual International Symposium on Computer Architecture (ISCA '12)
By John Demme, Robert Martin, Simha Sethumadhavan
Issue Date:June 2012
pp. 118-129
Over the past two decades, several microarchitectural side channels have been exploited to create sophisticated security attacks. Solutions to this problem have mainly focused on fixing the source of leaks either by limiting the flow of information through...
     
Side-channel vulnerability factor: a metric for measuring information leakage
Found in: Proceedings of the 39th Annual International Symposium on Computer Architecture (ISCA '12)
By Adam Waksman, John Demme, Robert Martin, Simha Sethumadhavan
Issue Date:June 2012
pp. 106-117
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. However there is currently no systematic, holistic methodology for understanding in...
     
Computational analysis of perfect-information position auctions
Found in: Proceedings of the tenth ACM conference on Electronic commerce (EC '09)
By David Robert Martin Thompson, Kevin Leyton-Brown
Issue Date:July 2009
pp. 70-73
Position auctions were widely used by search engines to sell keyword advertising before being well understood (and, indeed, studied) theoretically. To date, theorists have made significant progress, for example showing that a given auction is efficient or ...
     
Creating the secure software testing target list
Found in: Proceedings of the 4th annual workshop on Cyber security and informaiton intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead (CSIIRW '08)
By Robert A. Martin, Sean Barnum
Issue Date:May 2008
pp. N/A
Most organizations want assurance that their software has been tested for known security issues. Government, industry and academia are working together to make this more economical and effective. In addition to the obvious relevance to software development...
     
Vio: a mixed-initiative approach to learning and automating procedural update tasks
Found in: Proceedings of the SIGCHI conference on Human factors in computing systems (CHI '07)
By Anthony Tomasic, Ian Hargraves, Isaac Simmons, Jason Cornwell, John Zimmerman, Ken Mohnkern, Robert Martin McGuire
Issue Date:April 2007
pp. 1445-1454
Today many workers spend too much of their time translating their co-workers' requests into structures that information systems can understand. This paper presents the novel interaction design and evaluation of VIO, an agent that helps workers trans late r...
     
 1