Sciweavers

3003 search results - page 201 / 601
» Software Security: Building Security In
Sort
View
IAW
2003
IEEE
15 years 10 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
WORM
2004
15 years 6 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu
IPPS
2007
IEEE
15 years 11 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai
ICDCS
2010
IEEE
15 years 8 months ago
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage
—Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an ...
Ranjan Pal, Leana Golubchik
IWPC
2009
IEEE
15 years 11 months ago
Practical static analysis for inference of security-related program properties
We present a static analysis framework for inference of security-related program properties. Within this framework we design and implement ownership, immutability and information ...
Yin Liu, Ana Milanova