Sciweavers

ACSAC
2003
IEEE
13 years 9 months ago
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
ACSAC
2003
IEEE
13 years 9 months ago
A Multi-View Tool for Checking the Security Semantics of Router Configurations
Routers are critical components of IP networks, but hardly any tool support for analyzing their security exists to date. We have developed such a tool, named CROCODILE, that track...
Holger Peine, Reinhard Schwarz
ACSAC
2003
IEEE
13 years 9 months ago
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
ACSAC
2003
IEEE
13 years 9 months ago
PSOS Revisited
This paper provides a retrospective view of the design of SRI’s Provably Secure Operating System (PSOS), a formally specified tagged-capability hierarchical system architecture...
Peter G. Neumann, Richard J. Feiertag
ACSAC
2003
IEEE
13 years 9 months ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
ACSAC
2003
IEEE
13 years 9 months ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli
ACSAC
2003
IEEE
13 years 9 months ago
Forum Session: Security for Wireless Sensor Networks
Wireless networks of low-power sensing devices are poised to become a ubiquitous part of the computing landscape. Proposed applications of these networks range from health care to...
David Carman, Daniel Coffin, Bruno Dutertre, Vipin...
ACSAC
2003
IEEE
13 years 9 months ago
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS
Over the past decade, Intrusion Detection Systems (IDS) have improved steadily in the efficiency and effectiveness with which they detect intrusive activity. This is particularly ...
Nathan Carey, George M. Mohay, Andrew Clark
ACSAC
2003
IEEE
13 years 9 months ago
Poly2 Paradigm: A Secure Network Service Architecture
General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of softw...
Eric Bryant, James P. Early, Rajeev Gopalakrishna,...