Sciweavers

3115 search results - page 15 / 623
» Synthesizing Secure Protocols
Sort
View
99
Voted
CCS
2009
ACM
15 years 6 months ago
Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering
Juan Caballero, Pongsin Poosankam, Christian Kreib...
96
Voted
CSFW
2004
IEEE
15 years 6 months ago
Abstraction and Refinement in Protocol Derivation
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
125
Voted
ENTCS
2006
137views more  ENTCS 2006»
15 years 2 months ago
Automated Security Protocol Analysis With the AVISPA Tool
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specif...
Luca Viganò
107
Voted
TAICPART
2010
IEEE
166views Education» more  TAICPART 2010»
15 years 1 months ago
Linguistic Security Testing for Text Communication Protocols
We introduce a new Syntax-based Security Testing (SST) framework that uses a protocol specification to perform security testing on text-based communication protocols. A protocol sp...
Ben W. Y. Kam, Thomas R. Dean
108
Voted
ICUMT
2009
15 years 14 days ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller