Sciweavers

17 search results - page 4 / 4
» RICH: Automatically Protecting Against Integer-Based Vulnera...
Sort
View
ACSAC
2008
IEEE
14 years 7 days ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
ICEGOV
2007
ACM
13 years 9 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...