Sciweavers

244 search results - page 18 / 49
» Dynamic Dependency Monitoring to Secure Information Flow
Sort
View
ICSE
2007
IEEE-ACM
15 years 9 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
ICIW
2007
IEEE
15 years 3 months ago
Towards a Framework for Dynamic Verification of Peer-to-Peer Systems
Ensuring dependability and security of Peer-toPeer (P2P) systems is an intricate task due to the autonomous and volatile nature of peers and the decentralization that characterize...
Theofrastos Koulouris, George Spanoudakis, Theocha...
DATE
2010
IEEE
155views Hardware» more  DATE 2010»
15 years 2 months ago
A Smart Space application to dynamically relate medical and environmental information
— In this paper we present a cross-domain application for ambient and health monitoring. The system architecture is intended to be openly extensible in order to fulfil unanticipa...
Fabio Vergari, Sara Bartolini, Federico Spadini, A...
ICFP
2012
ACM
13 years 14 hour ago
Addressing covert termination and timing channels in concurrent information flow systems
When termination of a program is observable by an adversary, confidential information may be leaked by terminating accordingly. While this termination covert channel has limited ...
Deian Stefan, Alejandro Russo, Pablo Buiras, Amit ...
ACSAC
2007
IEEE
15 years 4 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....