Sciweavers

37 search results - page 1 / 8
» acsac 2004
Sort
View
ACSAC
2004
IEEE
13 years 8 months ago
Detecting Kernel-Level Rootkits Through Binary Analysis
Christopher Krügel, William K. Robertson, Gio...
ACSAC
2004
IEEE
13 years 8 months ago
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders
Dick Brackney, Terrance Goan, Allen Ott, Lockheed ...
ACSAC
2004
IEEE
13 years 8 months ago
A Look Back at "Security Problems in the TCP/IP Protocol Suite"
About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol suite, In particular, I focused on protocol-level issues, rather than implementation flaws. It...
Steven M. Bellovin
ACSAC
2004
IEEE
13 years 8 months ago
Towards Secure Design Choices for Implementing Graphical Passwords
We study the impact of selected parameters on the size of the password space for "Draw-A-Secret" (DAS) graphical passwords. We examine the role of and relationships betw...
Julie Thorpe, Paul C. van Oorschot