Sciweavers

754 search results - page 3 / 151
» Generation of Signatures by Deformations
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
13 years 11 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
IJNSEC
2008
110views more  IJNSEC 2008»
13 years 5 months ago
Improvement on Nominative Proxy Signature Schemes
In a nominative proxy signature scheme, an original singer delegates his signing power to a proxy signer, who generates a nominative signature on behalf of the original signer. In...
Zuo-Wen Tan
SP
2005
IEEE
13 years 11 months ago
Language-Based Generation and Evaluation of NIDS Signatures
We present a methodology to automatically construct robust signatures whose accuracy is based on formal reasoning so it can be systematically evaluated. Our methodology is based o...
Shai Rubin, Somesh Jha, Barton P. Miller
PAMI
2006
99views more  PAMI 2006»
13 years 5 months ago
Symbolic Signatures for Deformable Shapes
Recognizing classes of objects from their shape is an unsolved problem in machine vision that entails the ability of a computer system to represent and generalize complex geometric...
Salvador Ruiz-Correa, Linda G. Shapiro, Marina Mei...
ICPR
2004
IEEE
14 years 6 months ago
Deformable Geometry Model Matching by Topological and Geometric Signatures
In this paper, we present a novel method for efficient 3D model comparison. The method matches highly deformed models by comparing topological and geometric features. First, we pr...
Kwok-Leung Tam, Rynson W. H. Lau, Chong-Wah Ngo