Sciweavers

36 search results - page 2 / 8
» acsac 2002
Sort
View
ACSAC
2002
IEEE
13 years 9 months ago
Detecting and Defending against Web-Server Fingerprinting
Cyber attacks continue to increase in sophistication. Advanced attackers often gather information about a target system before launching a precise attack to exploit a discovered v...
Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt
ACSAC
2002
IEEE
13 years 9 months ago
Throttling Viruses: Restricting propagation to defeat malicious mobile code
Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to ...
Matthew M. Williamson
ACSAC
2002
IEEE
13 years 9 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
ACSAC
2002
IEEE
13 years 9 months ago
With Gaming Technology towards Secure User Interfaces
Technology aimed at making life easier for game developers is an issue of controversy among security experts. Objections arise out of concerns of stability of a gamefriendly platf...
Hanno Langweg
ACSAC
2002
IEEE
13 years 9 months ago
Malicious Code Detection for Open Firmware
Malicious boot firmware is a largely unrecognized but significant security risk to our global information infrastructure. Since boot firmware executes before the operating syst...
Frank Adelstein, Matthew Stillerman, Dexter Kozen