Sciweavers

93 search results - page 2 / 19
» A Diagrammatical Framework for Information Systems Attacks
Sort
View
SOUPS
2005
ACM
13 years 11 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
SIGSOFT
1993
ACM
13 years 9 months ago
Using Style to Understand Descriptions of Software Architecture
The software architecture of most systems is described informally and diagrammatically. In order for these descriptions to be meaningful at all, gures are understood by interpreti...
Gregory D. Abowd, Robert Allen, David Garlan
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 3 days ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
13 years 11 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
13 years 9 months ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...