Sciweavers

1101 search results - page 44 / 221
» On the Security and Vulnerability of PING
Sort
View
CSFW
2010
IEEE
15 years 1 months ago
Towards a Formal Foundation of Web Security
—We propose a formal model of web security based straction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We id...
Devdatta Akhawe, Adam Barth, Peifung E. Lam, John ...
ASPDAC
2005
ACM
104views Hardware» more  ASPDAC 2005»
14 years 11 months ago
Low-power techniques for network security processors
Abstract— In this paper, we present several techniques for lowpower design, including a descriptor-based low-power scheduling algorithm, design of dynamic voltage generator, and ...
Yi-Ping You, Chun-Yen Tseng, Yu-Hui Huang, Po-Chiu...
ACSAC
2010
IEEE
14 years 1 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo
DASC
2006
IEEE
15 years 1 months ago
Runtime Security Verification for Itinerary-Driven Mobile Agents
We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from t...
Zijiang Yang, Shiyong Lu, Ping Yang
CCS
2011
ACM
13 years 9 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...