Sciweavers

550 search results - page 46 / 110
» A lightweight approach to state based security testing
Sort
View
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 4 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
SAFECOMP
2007
Springer
15 years 3 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
ACSAC
2006
IEEE
15 years 1 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
ATAL
2005
Springer
15 years 3 months ago
Using decision-theoretic models to enhance agent system survivability
A survivable agent system depends on the incorporation of many recovery features. However, the optimal use of these features requires the ability to assess the actual state of the...
Anthony R. Cassandra, Marian H. Nodine, Shilpa Bon...
ATS
2009
IEEE
127views Hardware» more  ATS 2009»
15 years 2 months ago
On the Generation of Functional Test Programs for the Cache Replacement Logic
Caches are crucial components in modern processors (both stand-alone or integrated into SoCs) and their test is a challenging task, especially when addressing complex and high-fre...
Wilson J. Perez, Danilo Ravotto, Edgar E. Sá...