Sciweavers

197 search results - page 8 / 40
» Feasibility of Multi-Protocol Attacks
Sort
View
ESSOS
2009
Springer
14 years 2 months ago
Report: Measuring the Attack Surfaces of Enterprise Software
Abstract. Software vendors are increasingly concerned about mitigating the security risk of their software. Code quality improvement is a traditional approach to mitigate security ...
Pratyusa K. Manadhata, Yücel Karabulut, Jeann...
DBSEC
2008
152views Database» more  DBSEC 2008»
13 years 8 months ago
An Attack Graph-Based Probabilistic Security Metric
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
ENDM
2010
105views more  ENDM 2010»
13 years 7 months ago
Minimizing Expected Attacking Cost in Networks
A branch-and-bound algorithm is devised to determine the optimal attack strategy to disconnect a network where the objective is to minimize the expected attacking cost. The attack...
Anis Gharbi, Mohamed Naceur Azaiez, Mohamed Kharbe...
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
14 years 8 days ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
COMPUTER
2008
86views more  COMPUTER 2008»
13 years 7 months ago
SSL/TLS Session-Aware User Authentication
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, such as Internet banking. SSL/TLS session-aware user authentication can be used to ...
Rolf Oppliger, Ralf Hauser, David A. Basin