Sciweavers

382 search results - page 16 / 77
» Rule-based static analysis of network protocol implementatio...
Sort
View
NDSS
2000
IEEE
15 years 4 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
ICNP
2007
IEEE
15 years 6 months ago
A Performance Study of Loss Detection/Recovery in Real-world TCP Implementations
— TCP is the dominant transport protocol used in the Internet and its performance fundamentally governs the performance of Internet applications. It is well-known that packet los...
Sushant Rewaskar, Jasleen Kaur, F. Donelson Smith
POPL
2000
ACM
15 years 4 months ago
A Type System for Dynamic Web Documents
Many interactive Web services use the CGI interface for communication with clients. They will dynamically create HTML documents that are presented to the client who then resumes t...
Anders Sandholm, Michael I. Schwartzbach
CSREASAM
2004
15 years 1 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal
86
Voted
PDPTA
2003
15 years 1 months ago
Analysis and Enhancement of Pipelining the Protocol Overheads for a High Throughput
This paper investigates the protocol overhead pipelining between the host and network interface card (NIC). Existing researches into the protocol overhead pipelining assume that p...
Hyun-Wook Jin, Chuck Yoo