Sciweavers

47 search results - page 2 / 10
» A weakest precondition approach to active attacks analysis
Sort
View
TELSYS
2010
132views more  TELSYS 2010»
13 years 3 hour ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
ISSTA
2012
ACM
11 years 7 months ago
Detecting inconsistencies via universal reachability analysis
Recent research has suggested that a large class of software bugs fall into the category of inconsistencies, or cases where two pieces of program code make incompatible assumption...
Aaron Tomb, Cormac Flanagan
ATVA
2006
Springer
99views Hardware» more  ATVA 2006»
13 years 9 months ago
Whodunit? Causal Analysis for Counterexamples
Although the counterexample returned by a model checker can help in reproducing the symptom related to a defect, a significant amount of effort is often required for the programmer...
Chao Wang, Zijiang Yang, Franjo Ivancic, Aarti Gup...
SIAMSC
2011
126views more  SIAMSC 2011»
13 years 7 days ago
Fast Structured AMG Preconditioning for the Bidomain Model in Electrocardiology
The electrical activity of the heart may be modeled by a non-linear system of partial differential equations known as the bidomain model. Due to the rapid variations in the electr...
Micol Pennacchio, Valeria Simoncini
ASPLOS
2006
ACM
13 years 11 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...