Sciweavers

1028 search results - page 57 / 103
» Using Attack Graphs to Design Systems
Sort
View
131 views 97 votes 15 years 2 months ago  USS 2004»
It is well known that it is insecure to use the access(2) system call in a setuid program to test for the ability of the program's executor to access a file before opening sa...
108 views 88 votes 15 years 1 months ago  IEEESP 2006»
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
99 views 83 votes 15 years 7 months ago  IEEEARES 2008»
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
293 views 130 votes 13 years 3 months ago  ESORICS 2012»
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
252 views 157 votes 13 years 3 months ago  SDM 2012»
Multiple data sources containing different types of features may be available for a given task. For instance, users’ profiles can be used to build recommendation systems. In a...
243 views 102 votes 15 years 7 months ago  IISWC 2008»
The design and evaluation of microprocessor architectures is a difficult and time-consuming task. Although small, handcoded microbenchmarks can be used to accelerate performance e...
156 views 137 votes 15 years 5 months ago  RSP 2000»
Dataflow programming has proven to be popular for representing applications in rapid prototyping tools for digital signal processing (DSP); however, existing dataflow design tools...
93 views 93 votes 16 years 2 months ago  DAC 2006»
Simulation and verification using electronic design automation (EDA) tools are key steps in the design process for communication and signal processing systems. The synchronous dat...
141 views 126 votes 16 years 28 days ago  MOBISYS 2004»
The 802.11 IEEE Standard has enabled low cost and effective wireless LAN services (WLAN). With the sales and deployment of WLAN based networks exploding, many people believe that ...
106 views 123 votes 15 years 7 months ago  VEE 2006»
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...