Sciweavers

1028 search results - page 25 / 103
» Using Attack Graphs to Design Systems
Sort
View
138 views 119 votes 14 years 11 months ago  SPRINGSIM 2010»
This paper presents a distributed Bayesian fault diagnosis scheme for physical systems. Our diagnoser design is based on a procedure for factoring the global system bond graph (BG...
101 views 124 votes 15 years 7 months ago  INFOCOM 2006»
Abstract— Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains connections with a nu...
123 views 115 votes 15 years 6 months ago  WCRE 2002»
Over the past few years, we are experiencing a surge of evolution problems related to legacy object-oriented systems. Object orientation provides means for systems to be well-desi...
161 views 142 votes 15 years 6 months ago  SIGCOMM 2004»
Name services are critical for mapping logical resource names to physical resources in large-scale distributed systems. The Domain Name System (DNS) used on the Internet, however,...
120 views 97 votes 15 years 7 months ago  INFOCOM 2008»
—The design of computer and communication systems has been based, for decades, on the fundamental assumption that the objective of all users is to improve their own performance. ...
96 views 114 votes 15 years 1 months ago  IJNSEC 2008»
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
119 views 104 votes 15 years 7 months ago  COMSWARE 2007»
The Elliptic Curve Digital Signature Algorithm admits a natural parallelization wherein the point multiplication step can be split in two parts and executed in parallel. Further pa...
178 views 139 votes 14 years 8 months ago  TCOS 2010»
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
164 views 114 votes 15 years 8 months ago  HOST 2009»
Abstract—Rapid advances in integrated circuit (IC) development predicted by Moore’s Law lead to increasingly complex, hard to verify IC designs. Design insiders or adversaries ...
150 views 116 votes 14 years 11 months ago  SICHERHEIT 2010»
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...