Sciweavers

499 search results - page 51 / 100
» A Study on Latent Vulnerabilities
Sort
View
95
Voted
CCS
2008
ACM
15 years 2 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...
79
Voted
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 18 days ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
118
Voted
P2P
2010
IEEE
136views Communications» more  P2P 2010»
14 years 10 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
ICPR
2008
IEEE
16 years 1 months ago
Fake fingertip generation from a minutiae template
This work reports a preliminary study on the vulnerability evaluation of fingerprint verification systems to direct attacks carried out with fake fingertips created from minutiae ...
Alessandra Lumini, Davide Maltoni, Javier Galbally...
99
Voted
ICCD
2007
IEEE
180views Hardware» more  ICCD 2007»
15 years 9 months ago
Improving the reliability of on-chip data caches under process variations
On-chip caches take a large portion of the chip area. They are much more vulnerable to parameter variation than smaller units. As leakage current becomes a significant component ...
Wei Wu, Sheldon X.-D. Tan, Jun Yang 0002, Shih-Lie...