Sciweavers

1028 search results - page 53 / 103
» Using Attack Graphs to Design Systems
Sort
View
72 views 105 votes 15 years 1 months ago  JSA 1998»
In this paper, we present a network conscious approach to designing distributed real-time systems. Given a task graph design of the system, the end-to-end constraints on the input...
142 views 114 votes 15 years 5 months ago  FPGA 1998»
Multi-FPGA systems (MFSs) are used as custom computing machines, logic emulators and rapid prototyping vehicles. A key aspect of these systems is their programmable routing archit...
142 views 110 votes 15 years 1 months ago  JNW 2006»
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
117 views 102 votes 15 years 7 months ago  IPCCC 2006»
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
127 views 117 votes 15 years 7 months ago  COMPSAC 2008»
In this paper, we describe a framework for the computeraided evolution of the designs of object-oriented software systems. Evolution mechanisms are software structures that prepar...
132 views 120 votes 14 years 11 months ago  USS 2010»
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
238 views 104 votes 14 years 11 months ago  ACSAC 2010»
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
125 views 97 votes 15 years 6 months ago  CCS 2005»
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
113 views 108 votes 15 years 7 months ago  SP 2007»
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
133 views 97 votes 16 years 1 months ago  ICSE 2004»
Abstract. Building systems from existing applications written in two or more languages is common practice. Such systems are polylingual. Polylingual systems are relatively easy to ...