: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P′ , automatically generate an exploit for the potentially unknow...
David Brumley, Pongsin Poosankam, Dawn Xiaodong So...
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Abstract. Inthis paper we present several weaknesses in the keyscheduling algorithm of RC4, and describe their cryptanalytic signi cance. We identify a large number of weak keys, i...