Sciweavers

1101 search results - page 6 / 221
» On the Security and Vulnerability of PING
Sort
View
SIGMETRICS
2008
ACM
13 years 8 months ago
Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 2 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
CSREASAM
2006
13 years 10 months ago
Design and Implementation of a High-Performance Active Network Security System
This paper describes the design, implementation and performance of a high-performance security system - Active Network Security Immune System (ANSIS)
Wen Ouyang, Kun-Ming Yu, Wen-Ping Lee
WISA
2004
Springer
14 years 1 months ago
Vulnerability of a Mobile Payment System Proposed at WISA 2002
SangCheol Hwang, Dong Hoon Lee 0002, Daewan Han, J...
ER
2009
Springer
166views Database» more  ER 2009»
14 years 3 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone