Sciweavers

69 search results - page 5 / 14
» Protected IP-core test generation
Sort
View
MM
2005
ACM
114views Multimedia» more  MM 2005»
15 years 3 months ago
IMAGINATION: a robust image-based CAPTCHA generation system
We propose IMAGINATION (IMAge Generation for INternet AuthenticaTION), a system for the generation of attack-resistant, user-friendly, image-based CAPTCHAs. In our system, we prod...
Ritendra Datta, Jia Li, James Ze Wang
83
Voted
APSEC
2006
IEEE
15 years 3 months ago
Testing of Timer Function Blocks in FBD
Testing for time-related behaviors of PLC software is important and should be performed carefully. We propose a structural testing technique on Function Block Diagram(FBD) network...
Eunkyoung Jee, Seungjae Jeon, Hojung Bang, Sung De...
CCS
2004
ACM
15 years 2 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
SOUPS
2005
ACM
15 years 3 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
DATE
2008
IEEE
123views Hardware» more  DATE 2008»
15 years 4 months ago
Test Strategies for Low Power Devices
Ultra low-power devices are being developed for embedded applications in bio-medical electronics, wireless sensor networks, environment monitoring and protection, etc. The testing...
C. P. Ravikumar, M. Hirech, X. Wen