Sciweavers

COMPSAC
2009
IEEE
13 years 11 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
COMPSAC
2009
IEEE
13 years 11 months ago
A Perspective on Middleware-Oriented Context-Aware Pervasive Systems
The evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this...
Zakwan Jaroucheh, Xiaodong Liu, Sally Smith
COMPSAC
2009
IEEE
13 years 11 months ago
SN2K Attacks and Honest Services
—In this paper, we define and illustrate a new form of attack in the context of software services: the software-based need-to-know (SN2K) attack. SN2K attacks can be carried out...
Ashish Kundu
COMPSAC
2009
IEEE
13 years 11 months ago
Respecting Temporal Constraints in Virtualised Services
This paper reports some experiences in providing service guarantees to real-time (RT) applications running in a Virtual Machine (VM), showing how proper scheduling is a necessary ...
Tommaso Cucinotta, Gaetano Anastasi, Luca Abeni
COMPSAC
2009
IEEE
13 years 11 months ago
Penetration Testing for Spam Filters
Despite all the advances on techniques to block spam e-mail messages we still receive them on a frequent basis. This is due mainly to the ability of the spammers to modify the mes...
Yugesh Madhavan, João W. Cangussu, Ram Dant...
COMPSAC
2009
IEEE
13 years 11 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
COMPSAC
2009
IEEE
13 years 11 months ago
Defending Battery Exhaustion Attacks on Mobile Systems
Battery Exhaustion Attack is a “denial of service” attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the ...
Sungyong Shin, Taek Lee, Hoh Peter In
COMPSAC
2009
IEEE
13 years 11 months ago
Log Data as Digital Evidence: What Secure Logging Protocols Have to Offer?
Abstract—While log data are being increasingly used as digital evidence in judicial disputes, the extent to which existing secure logging protocols used to collect log data ful...
Rafael Accorsi
COMPSAC
2009
IEEE
13 years 11 months ago
A Contextual Guidance Approach to Software Security
With the ongoing trend towards the globalization of software systems and their development, components in these systems might not only work together, but may end up evolving indep...
Philipp Schügerl, David Walsh, Juergen Rillin...