Sciweavers

4511 search results - page 529 / 903
» Observation Based System Security
Sort
View
CCS
2007
ACM
15 years 11 months ago
A calculus of challenges and responses
er presents a novel approach for concisely abstracting authentication s and for subsequently analyzing those abstractions in a sound manner, i.e., deriving authentication guarante...
Michael Backes, Agostino Cortesi, Riccardo Focardi...
133
Voted
CCS
2007
ACM
15 years 11 months ago
On the infeasibility of modeling polymorphic shellcode
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
MMSEC
2006
ACM
220views Multimedia» more  MMSEC 2006»
15 years 11 months ago
Robust blind watermarking mechanism for motion data streams
The commercial reuse of 3D motion capture (Mocap) data in animation and life sciences raises issues with respect to its copyright. In order to improvise content protection of Moca...
Parag Agarwal, Ketaki Adi, B. Prabhakaran
118
Voted
STORAGESS
2006
ACM
15 years 11 months ago
Limiting trust in the storage stack
We propose a framework for examining trust in the storage stack based on different levels of trustworthiness present across different channels of information flow. We focus on ...
Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea...
118
Voted
CCS
2004
ACM
15 years 10 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...