Sciweavers

29 search results - page 1 / 3
» Using Attack Graphs to Design Systems
Sort
View
202 views 122 votes 14 years 8 months ago  WWW 2011»
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
190 views 135 votes 14 years 1 months ago  CCS 2011»
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
260 views 158 votes 14 years 1 months ago  COMPSYSTECH 2011»
Abstract. In a software watermarking environment, several graph theoretic watermark methods encode the watermark values as graph structures and embed them in application programs. ...
87 views 125 votes 14 years 8 months ago  JCS 2011»
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
207 views 130 votes 14 years 1 months ago  CSFW 2011»
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
127 views 122 votes 14 years 26 days ago  IACR 2011»
The KeeLoq cipher is used in many wireless car door systems and garage openers. Recently the algorithm was studied and several attacks have been published. When a random seed is no...
246 views 196 votes 14 years 4 months ago  ICITS 2011»
In this paper, we use the concept of colored edge graphs to model homogeneous faults in networks. We then use this model to study the minimum connectivity (and design) requirements...
191 views 134 votes 14 years 1 months ago  CRYPTO 2011»
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
289 views 158 votes 14 years 8 months ago  ISCI 2011»
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
159 views 141 votes 14 years 8 months ago  CORR 2011»
Abstract—In distributed storage systems built using commodity hardware, it is necessary to store multiple replicas of every data chunk in order to ensure system reliability. In s...