Sciweavers

1028 search results - page 37 / 103
» Using Attack Graphs to Design Systems
Sort
View
127 views 122 votes 14 years 28 days ago  IACR 2011»
The KeeLoq cipher is used in many wireless car door systems and garage openers. Recently the algorithm was studied and several attacks have been published. When a random seed is no...
93 views 111 votes 15 years 6 months ago  IMC 2004»
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
213 views 119 votes 15 years 6 months ago  SBCCI 2003»
Network on Chip (NoC) is a new paradigm for designing core based System on Chips. It supports high degree of reusability and is scalable. In this paper, an efficient Two-Step Gene...
296 views 127 votes 13 years 9 months ago  HICSS 2012»
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
153 views 126 votes 15 years 5 months ago  LCPC 1999»
Since the C language imposes little restriction on the use of function pointers, the task of call graph construction for a C program is far more di cult than what the algorithms d...
135 views 119 votes 15 years 7 months ago  IPPS 2008»
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
178 views 97 votes 15 years 7 months ago  ACSAC 2008»
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
150 views 99 votes 15 years 7 months ago  CCS 2007»
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all ...
142 views 88 votes 16 years 2 months ago  DAC 2009»
Power consumption of system-level on-chip communications is becoming more significant in the overall system-on-chip (SoC) power as technology scales down. In this paper, we propos...
217 views 114 votes 15 years 8 months ago  EUROSEC 2010»
Under conditions of heavy traffic load or sudden traffic bursts, the peak processing throughput of network intrusion detection systems (NIDS) may not be sufficient for inspecting ...