Sciweavers

207 search results - page 6 / 42
» Measuring Similarity for Security Vulnerabilities
Sort
View
89
Voted
SECRYPT
2007
78views Business» more  SECRYPT 2007»
15 years 5 months ago
Practical Secure Biometrics using Set Intersection as a Similarity Measure
Daniel Socek, Dubravko Culibrk, Vladimir Bozovic
153
Voted
COMCOM
2007
106views more  COMCOM 2007»
15 years 3 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis
137
Voted
CCS
2011
ACM
14 years 3 months ago
Automated black-box detection of side-channel vulnerabilities in web applications
Web applications divide their state between the client and the server. The frequent and highly dynamic client-server communication that is characteristic of modern web application...
Peter Chapman, David Evans
120
Voted
NDSS
2009
IEEE
15 years 10 months ago
Recursive DNS Architectures and Vulnerability Implications
DNS implementers face numerous choices in architecting DNS resolvers, each with profound implications for security. Absent the use of DNSSEC, there are numerous interim techniques...
David Dagon, Manos Antonakakis, Kevin Day, Xiapu L...
160
Voted
CCS
2011
ACM
14 years 3 months ago
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge—verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe...
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina...