Sciweavers

1028 search results - page 62 / 103
» Using Attack Graphs to Design Systems
Sort
View
102 views 84 votes 15 years 3 months ago  USS 2008»
A major class of network emulation testbeds is based on the Utah Emulab design: a local cluster of experimental nodes interconnected through Ethernet switches using VLANs. The VLA...
119 views 105 votes 15 years 7 months ago  DATE 2005»
Increase in system level modeling has given rise to a need for efficient functional validation of models above cycle accurate level. This paper presents a technique for comparing...
139 views 114 votes 15 years 6 months ago  IWDC 2004»
Abstract. Despite their crucial impact on the performances of p2p systems, very few is known on peers behaviors in such networks. We propose here a study of these behaviors in a ru...
98 views 131 votes 15 years 7 months ago  ISSRE 2008»
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
116 views 137 votes 15 years 7 months ago  NDSS 2005»
We present a solution to the denial of service (DoS) problem that does not rely on network infrastructure support, conforming to the end-to-end (e2e) design principle. Our approac...
139 views 118 votes 15 years 5 months ago  SPAA 2000»
In this paper, we study the design of fault tolerant networks for arrays and meshes by adding redundant nodes and edges. For a target graph G (linear array or mesh in this paper),...
92 views 88 votes 15 years 7 months ago  DATE 2007»
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
126 views 120 votes 15 years 1 months ago  ASE 1999»
Behaviour analysis should form an integral part of the software development process. This is particularly important in the design of concurrent and distributed systems, where comp...
170 views 160 votes 15 years 1 months ago  ISLPED 2010»
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
83 views 91 votes 15 years 6 months ago  ESORICS 2005»
Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in ...