139
click to vote
NDSS
15 years 8 months ago
2008 IEEE
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
132
click to vote
NDSS
15 years 8 months ago
2008 IEEE
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
147
click to vote
NDSS
15 years 8 months ago
2008 IEEE
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
131
click to vote
NDSS
15 years 8 months ago
2008 IEEE
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
|