Sciweavers

1028 search results - page 34 / 103
» Using Attack Graphs to Design Systems
Sort
View
207 views 137 votes 14 years 2 months ago  CSFW 2011»
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
132 views 99 votes 15 years 8 months ago  FSTTCS 2007»
Entanglement is a complexity measure of directed graphs that origins in fixed point theory. This measure has shown its use in designing efficient algorithms to verify logical prop...
167 views 131 votes 16 years 2 months ago  MOBIHOC 2008»
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
87 views 92 votes 16 years 3 months ago  WWW 2003»
We propose a novel structure, the data-sharing graph, for characterizing sharing patterns in large-scale data distribution systems. We analyze this structure in two such systems a...
122 views 124 votes 16 years 2 months ago  CADE 2004»
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...
97 views 117 votes 15 years 2 months ago  CCR 2005»
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
198 views 123 votes 15 years 1 months ago  CCS 2010»
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
157 views 113 votes 15 years 8 months ago  SIGCOMM 2006»
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
222 views 128 votes 13 years 10 months ago  COMSNETS 2012»
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
102 views 106 votes 15 years 8 months ago  MMSEC 2006»
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...