Sciweavers

1548 search results - page 108 / 310
» Estimating Software Vulnerabilities
Sort
View
APSEC
2006
IEEE
15 years 5 months ago
Secrobat: Secure and Robust Component-based Architectures
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Artem Vorobiev, Jun Han
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 3 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
CISC
2006
Springer
81views Cryptology» more  CISC 2006»
15 years 3 months ago
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
Buffer overflow(BOF) has been the most common form of vulnerability in software systems today, and many methods exist to defend software systems against BOF attacks. Among them, th...
Deok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hon...
NSDI
2008
15 years 1 months ago
Detecting In-Flight Page Changes with Web Tripwires
While web pages sent over HTTP have no integrity guarantees, it is commonly assumed that such pages are not modified in transit. In this paper, we provide evidence of surprisingly...
Charles Reis, Steven D. Gribble, Tadayoshi Kohno, ...
AGILEDC
2007
IEEE
15 years 5 months ago
The Relationship between Customer Collaboration and Software Project Overruns
Most agile projects rely heavily on good collaboration with the customer in order to achieve project goals and avoid overruns. However, the role of the customer in software projec...
Kjetil Moløkken-Østvold, Kristian Ma...