Sciweavers

2503 search results - page 374 / 501
» Building Computer Network Attacks
Sort
View
ICDCS
2007
IEEE
15 years 8 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
CCECE
2006
IEEE
15 years 7 months ago
Security Issues in VOIP Applications
Recent Voice over Internet Protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems involve se...
Patrick C. K. Hung, Miguel Vargas Martin
CORR
2011
Springer
175views Education» more  CORR 2011»
14 years 5 months ago
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Consider the problem of verifying security properties of a cryptographic protocol coded in C. We propose an automatic solution that needs neither a pre-existing protocol descripti...
Mihhail Aizatulin, Andrew D. Gordon, Jan Jürj...
ICDCS
2009
IEEE
15 years 10 months ago
The Digital Marauder's Map: A New Threat to Location Privacy
“The Marauder’s Map” is a magical map in J. K. Rowling’s fantasy series, “Harry Potter and the Prisoner of Azkaban”. It shows all moving objects within the “Hogwarts...
Xinwen Fu, Nan Zhang 0004, Aniket Pingley, Wei Yu,...
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
15 years 10 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee