Sciweavers

1028 search results - page 13 / 103
» Using Attack Graphs to Design Systems
Sort
View
118 views 150 votes 14 years 11 months ago  JNW 2008»
The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden o infrastructur...
150 views 89 votes 15 years 3 months ago  CCS 2008»
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
131 views 94 votes 15 years 6 months ago  DRM 2004»
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
175 views 103 votes 15 years 6 months ago  PRICAI 2004»
We propose a methodology for representing artificial creatures like 3D flowers. Directed graph and Lindenmayer system (L-system) are commonly involved in AI-based creativity resear...
84 views 101 votes 15 years 1 months ago  ALIFE 2004»
The concept of "self-protection", a capability of an organism to protect itself from exogenous attacks, is introduced to the design of artificial evolutionary systems as...
93 views 124 votes 15 years 1 months ago  JSAC 2006»
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
149 views 92 votes 14 years 11 months ago  TPCTC 2010»
Graph Database Management systems (GDBs) are gaining popularity. They are used to analyze huge graph datasets that are naturally appearing in many application areas to model interr...
202 views 109 votes 15 years 6 months ago  EUROCRYPT 2003»
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attack...
131 views 90 votes 16 years 1 months ago  MOBISYS 2009»
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
94 views 104 votes 15 years 6 months ago  SP 2003»
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...