Sciweavers

NDSS
2000
IEEE
13 years 8 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
NDSS
2000
IEEE
13 years 9 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
NDSS
2000
IEEE
13 years 9 months ago
Accountability and Control of Process Creation in Metasystems
The distinguishing feature of a metasystem is middleware that facilitates viewing a collection of large, distributed, heterogeneous resources as a single virtual machine, where ea...
Marty Humphrey, Frederick Knabe, Adam Ferrari, And...
NDSS
2000
IEEE
13 years 9 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song
NDSS
2000
IEEE
13 years 9 months ago
Analysis of a Fair Exchange Protocol
We analyze an optimistic contract signing protocol of Asokan, Shoup, and Waidner as a case study in the applicability of formal methods to verification of fair exchange protocols...
Vitaly Shmatikov, John C. Mitchell
NDSS
2000
IEEE
13 years 9 months ago
Building Adaptive and Agile Applications Using Intrusion Detection and Response
Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...
NDSS
2000
IEEE
13 years 9 months ago
An IPSec-based Host Architecture for Secure Internet Multicast
We propose a host architecture for secure IP multicast. We identify the basic components of the architecture, describe their functionalities and how they interact with one another...
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Di...
NDSS
2000
IEEE
13 years 9 months ago
Secure Password-Based Cipher Suite for TLS
Peter Buhler, Thomas Eirich, Michael Waidner, Mich...
NDSS
2000
IEEE
13 years 9 months ago
Chameleon Signatures
Abstract. Chameleon signatures simultaneously provide the properties of nonrepudiation and non-transferability for the signed message. However, the initial constructions of chamele...
Hugo Krawczyk, Tal Rabin
NDSS
2000
IEEE
13 years 9 months ago
Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues
The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems, is an important component of the Internet’s routing infrastructure...
Stephen T. Kent, Charles Lynn, Joanne Mikkelson, K...