Sciweavers

1028 search results - page 54 / 103
» Using Attack Graphs to Design Systems
Sort
View
132 views 120 votes 14 years 11 months ago  USS 2010»
Web browsers are increasingly designed to be extensible to keep up with the Web's rapid pace of change. This extensibility is typically implemented using script-based extensi...
238 views 104 votes 14 years 11 months ago  ACSAC 2010»
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
125 views 97 votes 15 years 6 months ago  CCS 2005»
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
113 views 108 votes 15 years 7 months ago  SP 2007»
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
133 views 97 votes 16 years 1 months ago  ICSE 2004»
Abstract. Building systems from existing applications written in two or more languages is common practice. Such systems are polylingual. Polylingual systems are relatively easy to ...
165 views 126 votes 15 years 7 months ago  CODES 2007»
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
137 views 133 votes 15 years 6 months ago  GD 2003»
Given two different drawings of a planar graph we consider the problem of morphing one drawing into the other. We designed and implemented an algorithm for intersection-free morph...
83 views 82 votes 15 years 2 months ago  DIMVA 2004»
: A honeynet is a special prepared network which is not used in normal business. It is a kind of playground to watch and learn the tactics of crackers. The only purpose of a honeyn...
128 views 116 votes 16 years 1 months ago  VLSID 2002»
: In this paper, we present a point-to-point (P2P) communication synthesis methodology for SystemOn-Chip (SOC) design. We consider real-time systems where IP selection, mapping and...
171 views 113 votes 15 years 2 months ago  AVI 2008»
Programming assignments are easy to plagiarize in such a way as to foil casual reading by graders. Graders can resort to automatic plagiarism detection systems, which can generate...