Sciweavers

392 search results - page 4 / 79
» Security vulnerabilities in IEEE 802.22
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 8 days ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
IEEEARES
2007
IEEE
14 years 17 days ago
Security vulnerabilities in DNS and DNSSEC
We present an analysis of security vulnerabilities in the Domain Name System (DNS) and the DNS Security Extensions (DNSSEC). DNS data that is provided by name servers lacks suppor...
Suranjith Ariyapperuma, Chris J. Mitchell
NDSS
2005
IEEE
13 years 12 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
DSN
2009
IEEE
14 years 1 months ago
Using web security scanners to detect vulnerabilities in web services
Marco Vieira, Nuno Antunes, Henrique Madeira
ISSRE
2005
IEEE
13 years 12 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier