Sciweavers

1028 search results - page 33 / 103
» Using Attack Graphs to Design Systems
Sort
View
127 views 121 votes 15 years 3 months ago  CMS 2006»
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
100 views 132 votes 15 years 2 months ago  JCS 2002»
STATL is an extensible state/transition-based attack description language designed to support intrusion detection. The language allows one to describe computer penetrations as seq...
190 views 147 votes 15 years 14 days ago  CASES 2010»
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
139 views 104 votes 15 years 8 months ago  INFOCOM 2006»
— The current Domain Name System (DNS) follows a hierarchical tree structure. Several recent efforts proposed to re-implement DNS as a peer-to-peer network with a flat structure...
140 views 128 votes 15 years 3 months ago  NETWORKING 2007»
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
207 views 137 votes 14 years 2 months ago  CSFW 2011»
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
132 views 99 votes 15 years 8 months ago  FSTTCS 2007»
Entanglement is a complexity measure of directed graphs that origins in fixed point theory. This measure has shown its use in designing efficient algorithms to verify logical prop...
167 views 129 votes 16 years 2 months ago  MOBIHOC 2008»
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
87 views 91 votes 16 years 3 months ago  WWW 2003»
We propose a novel structure, the data-sharing graph, for characterizing sharing patterns in large-scale data distribution systems. We analyze this structure in two such systems a...
122 views 124 votes 16 years 2 months ago  CADE 2004»
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...