Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
William Aiello, John Ioannidis, Patrick Drew McDan...
Web services received significant attention recently and several important web service platforms such as .NET are now available. The testing and evaluation of web services are imp...
Wei-Tek Tsai, Raymond A. Paul, Weiwei Song, Zhibin...
Forcing all IP packets to carry correct source addresses can greatly help network security, attack tracing, and network problem debugging. However, due to asymmetries in toda...
Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter L. Re...
An instruction set architecture (ISA) suitable for future microprocessor design constraints is proposed. The ISA has hierarchical register files with a small number of accumulator...
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...