Sciweavers

1028 search results - page 20 / 103
» Using Attack Graphs to Design Systems
Sort
View
93 views 99 votes 15 years 2 months ago  CASCON 1997»
Often, software architects impose a particular style on the software systems they design. For large software systems, they would like to ensure that the design continues to confor...
162 views 118 votes 14 years 11 months ago  VIROLOGY 2010»
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
102 views 111 votes 15 years 5 months ago  FSE 1998»
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
109 views 100 votes 15 years 4 months ago  KBSE 1995»
Numerical design optimization algorithms are highly sensitive to the particular formulation of the optimization problems they are given. The formulation of the search space, the o...
134 views 107 votes 15 years 7 months ago  IWSOS 2007»
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such...
200 views 107 votes 16 years 2 months ago  DAC 2007»
The inherent limitations of embedded systems make them particularly vulnerable to attacks. We have developed a hardware monitor that operates in parallel to the embedded processor...
137 views 102 votes 15 years 7 months ago  HICSS 2007»
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
129 views 112 votes 15 years 2 months ago  ISCAPDCS 2004»
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
129 views 104 votes 15 years 7 months ago  IEEEARES 2006»
-- Domain Name Systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are e...
171 views 117 votes 15 years 6 months ago  CHI 2010»
We present a tangible user interface (TUI) called Tangible Graph Builder, that has been designed to allow visually impaired users to access graph and chart-based data. We describe...