Sciweavers

3115 search results - page 1 / 623
» Synthesizing Secure Protocols
Sort
View
ESORICS
2007
Springer
13 years 11 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
FORTE
2008
13 years 6 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
SP
2010
IEEE
419views Security Privacy» more  SP 2010»
13 years 8 months ago
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
Matt Fredrikson, Somesh Jha, Mihai Christodorescu,...
ICCD
1991
IEEE
86views Hardware» more  ICCD 1991»
13 years 8 months ago
Synthesizing Converters Between Finite State Protocols
Janaki Akella, Kenneth L. McMillan
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
13 years 11 months ago
PLUS: Synthesizing privacy, lineage, uncertainty and security
— Privacy, lineage, uncertainty, and security are important to many information integration efforts, and these “PLUS” properties interact in a number of complex ways. This pa...
Barbara T. Blaustein, Len Seligman, Michael Morse,...