Sciweavers

27 search results - page 6 / 6
» Towards Automation of Testing High-Level Security Properties
Sort
View
VIZSEC
2004
Springer
13 years 10 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
OOPSLA
2007
Springer
13 years 11 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden