Sciweavers

1028 search results - page 14 / 103
» Using Attack Graphs to Design Systems
Sort
View
93 views 124 votes 15 years 1 months ago  JSAC 2006»
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
149 views 92 votes 14 years 11 months ago  TPCTC 2010»
Graph Database Management systems (GDBs) are gaining popularity. They are used to analyze huge graph datasets that are naturally appearing in many application areas to model interr...
202 views 109 votes 15 years 6 months ago  EUROCRYPT 2003»
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security is usually analysed in terms of correlation attack...
131 views 91 votes 16 years 1 months ago  MOBISYS 2009»
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
94 views 104 votes 15 years 6 months ago  SP 2003»
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
124 views 110 votes 15 years 4 months ago  GECCO 2006»
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
123 views 105 votes 15 years 7 months ago  HICSS 2007»
In a world where intelligence can be arguably measured by an animal’s ability to use tools, are we marking ourselves for natural selection? Software development tools are steadi...
139 views 113 votes 15 years 5 months ago  STOC 1998»
In [6], Gallager introduces a family of codes based on sparse bipartite graphs, which he calls low-density parity-check codes. He suggests a natural decoding algorithm for these c...
94 views 87 votes 15 years 6 months ago  ATAL 2003»
Distributed Internet-based attacks on computer systems are becoming more prevalent. These attacks usually employ some form of automation and involve the compromise of many systems...
117 views 104 votes 15 years 6 months ago  ITCC 2005»
This paper presents a high performance and scalable elliptic curve processor which is designed to be resistant against timing attacks. The point multiplication algorithm (double-a...