Sciweavers

350 search results - page 55 / 70
» Improving application security with data flow assertions
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Perfect Failure Detection in the Partitioned Synchronous Distributed System Model
—In this paper we show that it is possible to implement a perfect failure detector P (one that detects all faulty processes if and only if those processes failed) in a non-synchr...
Raimundo José de Araújo Macêdo...
ACSAC
2005
IEEE
14 years 1 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
AVBPA
2005
Springer
266views Biometrics» more  AVBPA 2005»
14 years 1 months ago
A Hybrid Swipe Fingerprint Mosaicing Scheme
Due to their very small contact areas and low cost, swipe fingerprint sensors provide the very convenient and reliable fingerprint security solutions and are being increasingly u...
Yongliang Zhang, Jie Yang, Hongtao Wu
WISEC
2010
ACM
13 years 8 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
IPPS
2010
IEEE
13 years 5 months ago
MMT: Exploiting fine-grained parallelism in dynamic memory management
Dynamic memory management is one of the most expensive but ubiquitous operations in many C/C++ applications. Additional features such as security checks, while desirable, further w...
Devesh Tiwari, Sanghoon Lee, James Tuck, Yan Solih...