For many applications—including recognizing malware variants, determining the range of system versions vulnerable to a given attack, testing defense mechanisms, and filtering m...
Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H...
Concurrent, object-oriented programs often use thread-safe library classes. Existing techniques for testing a thread-safe class either rely on tests using the class, on formal spe...
In image authentication research, a common approach is to divide a given image into a number of smaller blocks, and embed a fragile watermark into each block. The modifications can...
Monitoring critical events such as constraints violations is one of the key issues of Autonomic Systems. This paper presents an interceptor based approach of constraint violation ...
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...