Sciweavers

2217 search results - page 399 / 444
» A Data Privacy Taxonomy
Sort
View
OOPSLA
2009
Springer
15 years 10 months ago
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations
An object diagram makes explicit the object structures that are only implicit in a class diagram. An object diagram may be missing and must extracted from the code. Alternatively,...
Marwan Abi-Antoun, Jonathan Aldrich
ACSAC
2008
IEEE
15 years 10 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
139
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
IEEEARES
2008
IEEE
15 years 10 months ago
Design of an FDB based Intra-domain Packet Traceback System
In this paper, we propose an FDB based intra-Domain Traceback System (FDB-DTS), which is a hybrid traceback system composed of packet digesting boxes and an iterative query engine...
Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadob...
SP
2008
IEEE
112views Security Privacy» more  SP 2008»
15 years 10 months ago
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
Web applications are ubiquitous, perform missioncritical tasks, and handle sensitive user data. Unfortunately, web applications are often implemented by developers with limited se...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...