Sciweavers

335 search results - page 26 / 67
» An Architecture-Centric Approach to Detecting Security Patte...
Sort
View
SCAM
2008
IEEE
14 years 2 months ago
Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering
Polymorphism and class hierarchies are key to increasing the extensibility of an object-oriented program but also raise challenges for program comprehension. Despite many advances...
Petru Florin Mihancea
CCS
2007
ACM
14 years 1 months ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks
IWPC
2007
IEEE
14 years 1 months ago
Detecting Interaction Coupling from Task Interaction Histories
A repository of task structures can reveal important latent knowledge about the development of a software system. Although approaches have been proposed to recover artifacts withi...
Lijie Zou, Michael W. Godfrey, Ahmed E. Hassan
COMPSAC
2009
IEEE
14 years 2 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
CCS
2010
ACM
13 years 7 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler