Sciweavers

144 search results - page 1 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
DIMVA
2007
13 years 6 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
ISPASS
2010
IEEE
13 years 11 months ago
Dynamic program analysis of Microsoft Windows applications
—Software instrumentation is a powerful and flexible technique for analyzing the dynamic behavior of programs. By inserting extra code in an application, it is possible to study...
Alex Skaletsky, Tevi Devor, Nadav Chachmon, Robert...
ICSE
2009
IEEE-ACM
13 years 2 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
WER
2004
Springer
13 years 10 months ago
Constructing Use Case Model by Using a Systematic Approach: Description of a Study
This paper presents the results of a feasability study that was carried out to evaluate the construction of Use Case Models by comparing the models with groups that used the GUCCRA...
Anderson Belgamo, Sandra Camargo Pinto Ferraz Fabb...
DLOG
2000
13 years 6 months ago
Adapting Optimization Techniques to Description Logics with Concrete Domains
In this paper, we demonstrate that the main standard optimization techniques dependency directed backtracking and model merging can be adapted to description logics with concrete ...
Anni-Yasmin Turhan, Volker Haarslev