Sciweavers

1028 search results - page 53 / 103
» Using Attack Graphs to Design Systems
Sort
View
72 views 113 votes 15 years 2 months ago  JSA 1998»
In this paper, we present a network conscious approach to designing distributed real-time systems. Given a task graph design of the system, the end-to-end constraints on the input...
142 views 120 votes 15 years 6 months ago  FPGA 1998»
Multi-FPGA systems (MFSs) are used as custom computing machines, logic emulators and rapid prototyping vehicles. A key aspect of these systems is their programmable routing archit...
142 views 117 votes 15 years 2 months ago  JNW 2006»
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
117 views 112 votes 15 years 8 months ago  IPCCC 2006»
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
127 views 127 votes 15 years 9 months ago  COMPSAC 2008»
In this paper, we describe a framework for the computeraided evolution of the designs of object-oriented software systems. Evolution mechanisms are software structures that prepar...
132 views 134 votes 15 years 10 days ago  USS 2010»
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
238 views 115 votes 15 years 15 days ago  ACSAC 2010»
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
125 views 103 votes 15 years 8 months ago  CCS 2005»
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
113 views 124 votes 15 years 8 months ago  SP 2007»
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
133 views 103 votes 16 years 2 months ago  ICSE 2004»
Abstract. Building systems from existing applications written in two or more languages is common practice. Such systems are polylingual. Polylingual systems are relatively easy to ...