Sciweavers

1028 search results - page 18 / 103
» Using Attack Graphs to Design Systems
Sort
View
142 views 117 votes 15 years 6 months ago  CCS 2003»
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
85 views 98 votes 15 years 2 months ago  FORTE 2004»
This paper proposes an algorithm for the construction of an MSC graph from a given set of actual behaviors of an existing concurrent system which has repetitive subfunctions. Such ...
87 views 134 votes 15 years 5 months ago  DEBS 2007»
Denial of Service (DoS) attacks continue to affect the availability of critical systems on the Internet. The existing DoS problem is enough to merit significant research dedicated...
260 views 158 votes 14 years 1 months ago  COMPSYSTECH 2011»
Abstract. In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. ...
166 views 117 votes 15 years 4 months ago  WADT 1998»
Graph transformation systems have been introduced for the formal specification of software systems. States are thereby modeled as graphs, and computations as graph derivations acco...
181 views 122 votes 15 years 5 months ago  GECCO 2007»
The multi domain nature of a mechatronic system makes it difficult to model using a single modeling technique over the whole system as varying sets of system variables are require...
135 views 122 votes 15 years 7 months ago  SIGCOMM 2006»
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
142 views 110 votes 15 years 7 months ago  ICPP 2006»
stractions are extensively used to understand and solve challenging computational problems in various scientific and engineering domains. They have particularly gained prominence...
98 views 87 votes 15 years 3 months ago  USENIX 2008»
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
208 views 130 votes 15 years 1 months ago  SIGCOMM 2010»
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...