Sciweavers

1019 search results - page 104 / 204
» Cryptographic Design Vulnerabilities
Sort
View
ASM
2010
ASM
16 years 28 days ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
ICCD
2007
IEEE
180views Hardware» more  ICCD 2007»
16 years 24 days ago
Improving the reliability of on-chip data caches under process variations
On-chip caches take a large portion of the chip area. They are much more vulnerable to parameter variation than smaller units. As leakage current becomes a significant component ...
Wei Wu, Sheldon X.-D. Tan, Jun Yang 0002, Shih-Lie...
111
Voted
TRUST
2009
Springer
15 years 10 months ago
Attacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some ver...
Sven Türpe, Andreas Poller, Jan Steffan, Jan-...
AINA
2007
IEEE
15 years 10 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 10 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard