Sciweavers

6167 search results - page 136 / 1234
» Can Refinement be Automated
Sort
View
ICISS
2007
Springer
15 years 10 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
BIBE
2006
IEEE
112views Bioinformatics» more  BIBE 2006»
15 years 10 months ago
Finding Correlations in Functionally Equivalent Proteins by Integrating Automated and Visual Data Exploration
The analysis of alignments of functionally equivalent proteins can reveal regularities such as correlated positions or residue patterns which are important to ensure a specific f...
Daniel A. Keim, Daniela Oelke, Royal Truman, Klaus...
DSN
2006
IEEE
15 years 10 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
ACSAC
2005
IEEE
15 years 10 months ago
ScriptGen: an automated script generation tool for honeyd
Honeyd [14] is a popular tool developed by Niels Provos that offers a simple way to emulate services offered by several machines on a single PC. It is a so called low interaction ...
Corrado Leita, Ken Mermoud, Marc Dacier
ISSRE
2005
IEEE
15 years 10 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier