Sciweavers

1028 search results - page 36 / 103
» Using Attack Graphs to Design Systems
Sort
View
228 views 119 votes 15 years 1 months ago  CCS 2010»
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
113 views 95 votes 15 years 7 months ago  DSN 2007»
The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past few years, distributed denial of service (DDoS) atta...
166 views 96 votes 16 years 1 months ago  SIGMOD 2001»
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
154 views 119 votes 15 years 7 months ago  PETRA 2009»
This paper describes a personalised rehabilitation application using a smart phone (PDA) and wireless (bio) sensors. It instructs and motivates patients to follow their exercise p...
188 views 116 votes 15 years 7 months ago  CEEMAS 2007»
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
127 views 122 votes 14 years 28 days ago  IACR 2011»
The KeeLoq cipher is used in many wireless car door systems and garage openers. Recently the algorithm was studied and several attacks have been published. When a random seed is no...
93 views 111 votes 15 years 6 months ago  IMC 2004»
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
213 views 119 votes 15 years 6 months ago  SBCCI 2003»
Network on Chip (NoC) is a new paradigm for designing core based System on Chips. It supports high degree of reusability and is scalable. In this paper, an efficient Two-Step Gene...
296 views 127 votes 13 years 9 months ago  HICSS 2012»
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
153 views 126 votes 15 years 5 months ago  LCPC 1999»
Since the C language imposes little restriction on the use of function pointers, the task of call graph construction for a C program is far more di cult than what the algorithms d...