Sciweavers

1028 search results - page 61 / 103
» Using Attack Graphs to Design Systems
Sort
View
155 views 116 votes 14 years 11 months ago  ML 2010»
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
186 views 117 votes 15 years 3 months ago  CCS 2008»
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
242 views 118 votes 14 years 11 months ago  ACSAC 2010»
New security architectures are difficult to prototype and test at the design stage. Fine-grained monitoring of the interactions between hardware, the operating system, and applica...
210 views 124 votes 15 years 6 months ago  VR 2002»
This paper focuses on the distributed architecture of the collaborative augmented reality system Studierstube. The system allows multiple users to experience a shared 3D workspace...
129 views 103 votes 15 years 10 months ago  SOSP 2007»
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
102 views 84 votes 15 years 3 months ago  USS 2008»
A major class of network emulation testbeds is based on the Utah Emulab design: a local cluster of experimental nodes interconnected through Ethernet switches using VLANs. The VLA...
119 views 105 votes 15 years 7 months ago  DATE 2005»
Increase in system level modeling has given rise to a need for efficient functional validation of models above cycle accurate level. This paper presents a technique for comparing...
139 views 114 votes 15 years 6 months ago  IWDC 2004»
Abstract. Despite their crucial impact on the performances of p2p systems, very few is known on peers behaviors in such networks. We propose here a study of these behaviors in a ru...
98 views 131 votes 15 years 7 months ago  ISSRE 2008»
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
116 views 137 votes 15 years 7 months ago  NDSS 2005»
We present a solution to the denial of service (DoS) problem that does not rely on network infrastructure support, conforming to the end-to-end (e2e) design principle. Our approac...