Sciweavers

1028 search results - page 80 / 103
» Using Attack Graphs to Design Systems
Sort
View
117 views 83 votes 15 years 1 months ago  BIRTHDAY 2010»
Abstract. The error-prone process of formal specification and verification of large systems requires an efficient, evolutionary formal development approach. Development graphs have...
106 views 92 votes 15 years 5 months ago  ACSAC 2004»
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
140 views 111 votes 15 years 7 months ago  CP 2007»
The increasing levels of system integration in Multi-Processor System-on-Chips (MPSoCs) emphasize the need for new design flows for efficient mapping of multi-task applications o...
126 views 85 votes 16 years 2 months ago  DAC 2005»
Signal processing and multimedia applications are often implemented on resource constrained embedded systems. It is therefore important to find implementations that use as little ...
159 views 142 votes 14 years 8 months ago  CORR 2011»
Abstract—In distributed storage systems built using commodity hardware, it is necessary to store multiple replicas of every data chunk in order to ensure system reliability. In s...
162 views 111 votes 15 years 3 months ago  PODC 2010»
The study of complex networks led to the belief that the connectivity of network nodes generally follows a Power-law distribution. In this work, we show that modeling large-scale ...
105 views 102 votes 15 years 7 months ago  IWSEC 2009»
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
144 views 87 votes 15 years 7 months ago  SP 2008»
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
100 views 120 votes 15 years 1 months ago  TOG 2008»
This paper addresses the problem of interactively modeling large street networks. We introduce a modeling framework that uses tensor fields to guide the generation of a street gra...
133 views 93 votes 15 years 6 months ago  ATAL 2005»
The PartNET++ system is an experimental multi-agent-based simulation tool that uses a new model based on hyper-graphs for understanding partnership formation among heterogeneous a...