Sciweavers

15 search results - page 3 / 3
» Automated containment of rootkits attacks
Sort
View
ECSQARU
2005
Springer
13 years 11 months ago
Symmetric Argumentation Frameworks
This paper is centered on the family of Dung’s finite argumentation frameworks when the attacks relation is symmetric (and nonempty and irreflexive). We show that while this fa...
Sylvie Coste-Marquis, Caroline Devred, Pierre Marq...
WS
2005
ACM
13 years 11 months ago
Strengthening EPC tags against cloning
The EPC (Electronic Product Code) tag is a form of RFID (Radio-Frequency IDentification) device that is emerging as a successor to the printed barcode. Like barcodes, EPC tags emi...
Ari Juels
WS
2006
ACM
13 years 11 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
SOUPS
2009
ACM
13 years 12 months ago
Balancing usability and security in a video CAPTCHA
We present a technique for using content-based video labeling as a CAPTCHA task. Our CAPTCHAs are generated from YouTube videos, which contain labels (tags) supplied by the person...
Kurt Alfred Kluever, Richard Zanibbi
ICSE
2009
IEEE-ACM
14 years 6 months ago
Taint-based directed whitebox fuzzing
We present a new automated white box fuzzing technique and a tool, BuzzFuzz, that implements this technique. Unlike standard fuzzing techniques, which randomly change parts of the...
Vijay Ganesh, Tim Leek, Martin C. Rinard