Sciweavers

1028 search results - page 16 / 103
» Using Attack Graphs to Design Systems
Sort
View
206 views 91 votes 15 years 4 months ago  CCS 2010»
In this paper, we propose a new form of image-based CAPTCHA we term "scene tagging". It tests the ability to recognize a relationship between multiple objects in an imag...
208 views 130 votes 15 years 1 months ago  CCS 2010»
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
115 views 109 votes 15 years 7 months ago  ITNG 2008»
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
134 views 102 votes 15 years 5 months ago  EUC 2007»
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
138 views 80 votes 15 years 7 months ago  BROADNETS 2007»
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
196 views 97 votes 15 years 2 months ago  CAISE 2010»
For enterprises it has become crucial to check compliance of their business processes with certain rules such as medical guidelines or financial regulations. When automating compli...
224 views 126 votes 15 years 1 months ago  CN 2007»
Large scale distributed systems typically have interactions among different services that create an avenue for propagation of a failure from one service to another. The failures ...
92 views 105 votes 15 years 6 months ago  COMPSAC 2005»
Distributed systems today are very vulnerable to malicious attacks, either from insiders or outsiders. When an attacker controls a component of the system, he may steal some sensi...
168 views 121 votes 15 years 7 months ago  WOWMOM 2006»
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
144 views 90 votes 15 years 8 months ago  NDSS 2009»
Host compromise is a serious computer security problem today. To better protect hosts, several Mandatory Access Control systems, such as Security Enhanced Linux (SELinux) and AppA...