Sciweavers

53 search results - page 7 / 11
» Extended Description Techniques for Security Engineering
Sort
View
ACSW
2006
13 years 8 months ago
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and net...
Rupinder Gill, Jason Smith, Andrew Clark
ASE
2006
148views more  ASE 2006»
13 years 7 months ago
PLFaultCAT: A Product-Line Software Fault Tree Analysis Tool
Industry currently employs a product line approach to software development and deployment as a means to enhance quality while reducing development cost and time. This effort has cr...
Josh Dehlinger, Robyn R. Lutz
SWAP
2008
13 years 8 months ago
Collaborative Enterprise Integrated Modelling
Abstract. Enterprise modelling focuses on the construction of a structured description, the so-called enterprise model, which represents (a subset of) the aspects relevant to the a...
Marco Rospocher, Chiara Ghidini, Luciano Serafini,...
CCS
2007
ACM
14 years 1 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 2 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson