Sciweavers

1028 search results - page 6 / 103
» Using Attack Graphs to Design Systems
Sort
View
89 views 86 votes 15 years 6 months ago  CCS 2003»
Attacks against Internet routing are increasing in number and severity. Contributing greatly to these attacks is the absence of origin authentication: there is no way to validate ...
189 views 108 votes 15 years 8 months ago  DATE 2009»
—Multiprocessor System on Chip (MPSoC) architecture is rapidly gaining momentum for modern embedded devices. The vulnerabilities in software on MPSoCs are often exploited to caus...
186 views 131 votes 16 years 1 months ago  OSDI 2006»
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
137 views 124 votes 15 years 3 months ago  EIT 2008»
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
144 views 115 votes 15 years 3 months ago  NSDI 2008»
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
110 views 101 votes 15 years 1 months ago  CORR 2010»
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
146 views 63 votes 15 years 6 months ago  GECCO 2005»
195 views 89 votes 16 years 25 days ago  PERCOM 2005»
Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the d...
202 views 122 votes 14 years 8 months ago  WWW 2011»
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
190 views 135 votes 14 years 1 months ago  CCS 2011»
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...