Sciweavers

1548 search results - page 81 / 310
» Estimating Software Vulnerabilities
Sort
View
ASWEC
2006
IEEE
15 years 5 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
ISPW
2006
IEEE
15 years 5 months ago
Definition and Analysis of Election Processes
This paper shows that process definition and analysis technologies can be used to reason about the vulnerability of election processes with respect to incorrect or fraudulent behav...
Mohammad S. Raunak, Bin Chen, Amr Elssamadisy, Lor...
COMPSAC
2005
IEEE
15 years 4 months ago
Experiences on Intrusion Tolerance Distributed Systems
Distributed systems today are very vulnerable to malicious attacks, either from insiders or outsiders. When an attacker controls a component of the system, he may steal some sensi...
Dengguo Feng, Ji Xiang
VSTTE
2005
Springer
15 years 4 months ago
WYSINWYX: What You See Is Not What You eXecute
What You See Is Not What You eXecute: computers do not execute source-code programs; they execute machine-code programs that are generated from source code. Not only can the WYSINW...
Gogul Balakrishnan, Thomas W. Reps, David Melski, ...
WETICE
2003
IEEE
15 years 4 months ago
A Network Worm Vaccine Architecture
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevated them to a first-class security threat to distributed systems. We present th...
Stelios Sidiroglou, Angelos D. Keromytis