Sciweavers

33 search results - page 1 / 7
» acsac 2010
Sort
View
126
Voted
ACSAC
2010
IEEE
15 years 20 days ago
SCOBA: source code based attestation on custom software
Liang Gu, Yao Guo, Anbang Ruan, Qingni Shen, Hong ...
ACSAC
2010
IEEE
15 years 1 months ago
Hardware assistance for trustworthy systems through 3-D integration
Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood,...
114
Voted
ACSAC
2010
IEEE
14 years 7 months ago
The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet
Joan Calvet, Carlton R. Davis, José M. Fern...
ACSAC
2010
IEEE
15 years 1 months ago
Network intrusion detection: dead or alive?
Research on network intrusion detection has produced a number of interesting results. In this paper, I look back to the NetSTAT system, which was presented at ACSAC in 1998. In ad...
Giovanni Vigna
114
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel