Sciweavers

167 search results - page 31 / 34
» Succession: Measuring transfer of code and developer product...
Sort
View
SEC
2004
13 years 9 months ago
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
Abstract--Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an antistack-smashing defense technique for Microsoft Wind...
Danny Nebenzahl, Avishai Wool
IDA
2010
Springer
13 years 6 months ago
A Data-Driven Paradigm to Understand Multimodal Communication in Human-Human and Human-Robot Interaction
Data-driven knowledge discovery is becoming a new trend in various scientific fields. In light of this, the goal of the present paper is to introduce a novel framework to study one...
Chen Yu, Thomas G. Smith, Shohei Hidaka, Matthias ...
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 2 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
CN
1999
128views more  CN 1999»
13 years 7 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
BPM
2005
Springer
228views Business» more  BPM 2005»
14 years 1 months ago
Risk Management in the BPM Lifecycle
Business Process Management is considered an essential strategy to create and maintain competitive advantage by streamlining and monitoring corporate processes. While the identific...
Michael zur Muehlen, Danny Ting-Yi Ho