Sciweavers

499 search results - page 70 / 100
» A Study on Latent Vulnerabilities
Sort
View
CCS
2005
ACM
15 years 6 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
WWW
2005
ACM
16 years 1 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
MOBISYS
2009
ACM
16 years 1 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
96
Voted
HPCA
2003
IEEE
16 years 25 days ago
Hierarchical Backoff Locks for Nonuniform Communication Architectures
This paper identifies node affinity as an important property for scalable general-purpose locks. Nonuniform communication architectures (NUCAs), for example CCNUMAs built from a f...
Zoran Radovic, Erik Hagersten
100
Voted
ESOP
2010
Springer
15 years 9 months ago
Faulty Logic: Reasoning about Fault Tolerant Programs
Transient faults are single-shot hardware errors caused by high energy particles from space, manufacturing defects, overheating, and other sources. Such faults can be devastating f...
Matthew L. Meola and David Walker