Sciweavers

SP
2010
IEEE
206views Security Privacy» more  SP 2010»
13 years 9 months ago
Revocation Systems with Very Small Private Keys
In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new “two equation” technique for revoking us...
Allison B. Lewko, Amit Sahai, Brent Waters
SP
2010
IEEE
164views Security Privacy» more  SP 2010»
13 years 9 months ago
A Proof-Carrying File System
Deepak Garg, Frank Pfenning
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
13 years 9 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
SP
2010
IEEE
161views Security Privacy» more  SP 2010»
13 years 9 months ago
Towards Static Flow-Based Declassification for Legacy and Untrusted Programs
Bruno P. S. Rocha, Sruthi Bandhakavi, Jerry den Ha...
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
13 years 9 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
SP
2010
IEEE
222views Security Privacy» more  SP 2010»
13 years 9 months ago
A Symbolic Execution Framework for JavaScript
—As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In ...
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng...
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
13 years 9 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
SP
2010
IEEE
217views Security Privacy» more  SP 2010»
13 years 9 months ago
Experimental Security Analysis of a Modern Automobile
Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular...
Karl Koscher, Alexei Czeskis, Franziska Roesner, S...
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
13 years 9 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
13 years 9 months ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig