114
click to vote
SP
15 years 6 months ago
2008 IEEE
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
100
Voted
SP
15 years 6 months ago
2008 IEEE
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
104
click to vote
SP
15 years 12 days ago
2008 IEEE
Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an inl...
89
Voted
SP
15 years 6 months ago
2008 IEEE
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
117
Voted
SP
15 years 12 days ago
2008 IEEE
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
|