Sciweavers

4330 search results - page 42 / 866
» Analyzing security architectures
Sort
View
DIMVA
2009
14 years 11 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono
DAC
2005
ACM
14 years 12 months ago
A pattern matching coprocessor for network security
Young H. Cho, William H. Mangione-Smith
FMCO
2003
Springer
154views Formal Methods» more  FMCO 2003»
15 years 3 months ago
Tools for Generating and Analyzing Attack Graphs
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
Oleg Sheyner, Jeannette M. Wing
SEKE
2004
Springer
15 years 3 months ago
Integrating Security Administration into Software Architectures Design
Software architecture plays a central role in developing software systems that satisfy functionality and security requirements. However, little has been done to integrate system d...
Huiqun Yu, Xudong He, Yi Deng, Lian Mo
CCS
2007
ACM
15 years 4 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...