Sciweavers

1028 search results - page 34 / 103
» Using Attack Graphs to Design Systems
Sort
View
207 views 131 votes 14 years 1 months ago  CSFW 2011»
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
132 views 93 votes 15 years 7 months ago  FSTTCS 2007»
Entanglement is a complexity measure of directed graphs that origins in fixed point theory. This measure has shown its use in designing efficient algorithms to verify logical prop...
167 views 115 votes 16 years 27 days ago  MOBIHOC 2008»
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
87 views 81 votes 16 years 2 months ago  WWW 2003»
We propose a novel structure, the data-sharing graph, for characterizing sharing patterns in large-scale data distribution systems. We analyze this structure in two such systems a...
122 views 109 votes 16 years 1 months ago  CADE 2004»
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...
97 views 105 votes 15 years 1 months ago  CCR 2005»
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
198 views 111 votes 15 years 7 days ago  CCS 2010»
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
157 views 103 votes 15 years 7 months ago  SIGCOMM 2006»
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
222 views 120 votes 13 years 9 months ago  COMSNETS 2012»
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
102 views 102 votes 15 years 7 months ago  MMSEC 2006»
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...