Sciweavers

47 search results - page 4 / 10
» On the vulnerability of face verification systems to hill-cl...
Sort
View
INFOCOM
2011
IEEE
14 years 27 days ago
Optimal Sybil-resilient node admission control
—Most existing large-scale networked systems on the Internet such as peer-to-peer systems are vulnerable to Sybil attacks where a single adversary can introduce many bogus identi...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...
ACSAC
2009
IEEE
15 years 4 months ago
Online Signature Generation for Windows Systems
—In this paper, we present a new, light-weight approach for generating filters for blocking buffer overflow attacks on Microsoft Windows systems. It is designed to be deployabl...
Lixin Li, James E. Just, R. Sekar
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
67
Voted
ICPR
2008
IEEE
15 years 10 months ago
Fake fingertip generation from a minutiae template
This work reports a preliminary study on the vulnerability evaluation of fingerprint verification systems to direct attacks carried out with fake fingertips created from minutiae ...
Alessandra Lumini, Davide Maltoni, Javier Galbally...
WETICE
2000
IEEE
15 years 1 months ago
Reducing Software Security Risk through an Integrated Approach
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...
David P. Gilliam, John C. Kelly, Matt Bishop