Sciweavers

1949 search results - page 192 / 390
» Protective Interface Specifications
Sort
View
CCS
2009
ACM
15 years 7 months ago
On the difficulty of software-based attestation of embedded devices
Device attestation is an essential feature in many security protocols and applications. The lack of dedicated hardware and the impossibility to physically access devices to be att...
Claude Castelluccia, Aurélien Francillon, D...
CCS
2007
ACM
15 years 7 months ago
Formal correctness of conflict detection for firewalls
We describe the formalization of a correctness proof for a conflict detection algorithm for firewalls in the Coq Proof Assistant. First, we give formal definitions in Coq of a fir...
Venanzio Capretta, Bernard Stepien, Amy P. Felty, ...
COMPSAC
2004
IEEE
15 years 6 months ago
Safety Tactics for Software Architecture Design
The influence of architecture in assurance of system safety is being increasingly recognised in mission-critical software applications. Nevertheless, most architectural strategies...
Weihang Wu, Tim Kelly
CCS
2006
ACM
15 years 6 months ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 6 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer