Sciweavers

1028 search results - page 5 / 103
» Using Attack Graphs to Design Systems
Sort
View
127 views 102 votes 15 years 7 months ago  ACSAC 2006»
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
147 views 104 votes 15 years 6 months ago  SIGMETRICS 2005»
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
132 views 116 votes 15 years 5 months ago  EUROMICRO 1996»
Transformational design integrates design and verification. It combines "correctness by construciion" and design creativity by the use ofpre-proven behaviour preserving ...
153 views 109 votes 15 years 6 months ago  ISAAC 2005»
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
94 views 77 votes 15 years 26 days ago  TC 2002»
: In this paper we show how design-level aspects can be used to develop high integrity systems. In our approach, a system designer must first identify the specific mechanisms requi...
89 views 86 votes 15 years 6 months ago  CCS 2003»
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
189 views 108 votes 15 years 8 months ago  DATE 2009»
—Multiprocessor System on Chip (MPSoC) architecture is rapidly gaining momentum for modern embedded devices. The vulnerabilities in software on MPSoCs are often exploited to caus...
186 views 131 votes 16 years 1 months ago  OSDI 2006»
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
137 views 124 votes 15 years 3 months ago  EIT 2008»
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
144 views 114 votes 15 years 3 months ago  NSDI 2008»
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...