Sciweavers

154
Voted
CCS
2006
ACM
15 years 7 months ago
EXE: automatically generating inputs of death
This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input,...
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, ...
132
Voted
DSN
2004
IEEE
15 years 7 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
108
Voted
DSN
2004
IEEE
15 years 7 months ago
Experience with Evaluating Human-Assisted Recovery Processes
We describe an approach to quantitatively evaluating human-assisted failure-recovery tools and processes in the environment of modern Internet- and enterprise-class server systems...
Aaron B. Brown, Leonard Chung, William Kakes, Calv...
131
Voted
CCS
2006
ACM
15 years 7 months ago
Provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Fe...
89
Voted
DSN
2004
IEEE
15 years 7 months ago
Workshop on Fault Diagnosis and Tolerance in Cryptography
Luca Breveglieri, Israel Koren