Sciweavers

6689 search results - page 68 / 1338
» A Network Security Monitor
Sort
View
USS
2010
13 years 6 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...
SP
2000
IEEE
14 years 1 months ago
IRM Enforcement of Java Stack Inspection
Two implementations are given for Java’s stack-inspection accesscontrol policy. Each implementation is obtained by generating an inlined reference monitor (IRM) for a different...
Úlfar Erlingsson, Fred B. Schneider
SICHERHEIT
2010
13 years 6 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
DSN
2006
IEEE
14 years 16 days ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
CCR
2006
136views more  CCR 2006»
13 years 9 months ago
Traffic classification on the fly
The early detection of applications associated with TCP flows is an essential step for network security and traffic engineering. The classic way to identify flows, i.e. looking at...
Laurent Bernaille, Renata Teixeira, Ismael Akodken...