Sciweavers

537 search results - page 34 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
HPCA
2009
IEEE
14 years 8 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
CSFW
2002
IEEE
14 years 17 days ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov
AVI
1998
13 years 9 months ago
Design method of interaction techniques for large information spaces
Our work focuses on the design of interaction techniques for large information spaces. Our goal is not to define yet another visualization technique but to provide insights for th...
Laurence Nigay, Frédéric Vernier
KBSE
2007
IEEE
14 years 1 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
SIGADA
2004
Springer
14 years 28 days ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton