Sciweavers

1028 search results - page 33 / 103
» Using Attack Graphs to Design Systems
Sort
View
127 views 111 votes 15 years 2 months ago  CMS 2006»
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
100 views 120 votes 15 years 29 days ago  JCS 2002»
STATL is an extensible state/transition-based attack description language designed to support intrusion detection. The language allows one to describe computer penetrations as seq...
190 views 140 votes 14 years 11 months ago  CASES 2010»
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
139 views 96 votes 15 years 7 months ago  INFOCOM 2006»
— The current Domain Name System (DNS) follows a hierarchical tree structure. Several recent efforts proposed to re-implement DNS as a peer-to-peer network with a flat structure...
140 views 119 votes 15 years 2 months ago  NETWORKING 2007»
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
207 views 131 votes 14 years 1 months ago  CSFW 2011»
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
132 views 93 votes 15 years 7 months ago  FSTTCS 2007»
Entanglement is a complexity measure of directed graphs that origins in fixed point theory. This measure has shown its use in designing efficient algorithms to verify logical prop...
167 views 115 votes 16 years 27 days ago  MOBIHOC 2008»
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
87 views 81 votes 16 years 2 months ago  WWW 2003»
We propose a novel structure, the data-sharing graph, for characterizing sharing patterns in large-scale data distribution systems. We analyze this structure in two such systems a...
122 views 109 votes 16 years 1 months ago  CADE 2004»
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...