Sciweavers

4511 search results - page 37 / 903
» Observation Based System Security
Sort
View
ISI
2007
Springer
15 years 8 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
ACSAC
2003
IEEE
15 years 7 months ago
A Failure to Learn from the Past
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Eugene H. Spafford
SP
2007
IEEE
101views Security Privacy» more  SP 2007»
15 years 8 months ago
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems
Ted Huffmire, Brett Brotherton, Gang Wang, Timothy...
SIGOPSE
2004
ACM
15 years 7 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
TDSC
2008
119views more  TDSC 2008»
15 years 1 months ago
Architectural Risk Analysis of Software Systems Based on Security Patterns
The importance of software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Further...
Spyros T. Halkidis, Nikolaos Tsantalis, Alexander ...