Sciweavers

31 search results - page 5 / 7
» Security mechanisms, attacks and security enhancements for t...
Sort
View
DSN
2007
IEEE
13 years 11 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ACSAC
2009
IEEE
13 years 11 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 1 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
GLOBECOM
2007
IEEE
14 years 1 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
INFOCOM
2002
IEEE
14 years 12 days ago
FPAC: Fast, Fixed-Cost Authentication for Access to Reserved Resources
—Enhanced network services often involve allocating resources (bandwidth/buffer space) preferentially to packets belonging to certain flows or traffic classes. Such services ar...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...