Sciweavers

10 search results - page 1 / 2
» On the Privacy of Peer-Assisted Distribution of Security Pat...
Sort
View
P2P
2010
IEEE
136views Communications» more  P2P 2010»
13 years 2 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
SP
2008
IEEE
13 years 10 months ago
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P′ , automatically generate an exploit for the potentially unknow...
David Brumley, Pongsin Poosankam, Dawn Xiaodong So...
SP
2006
IEEE
193views Security Privacy» more  SP 2006»
13 years 10 months ago
Analysis of the Linux Random Number Generator
Linux is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entrop...
Zvi Gutterman, Benny Pinkas, Tzachy Reinman
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 2 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers â...
Yanbin Lu, Gene Tsudik
ACSAC
2004
IEEE
13 years 8 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney