Sciweavers

50 search results - page 3 / 10
» Tools for Generating and Analyzing Attack Graphs
Sort
View
ECOOP
2012
Springer
11 years 10 months ago
Application-Only Call Graph Construction
Abstract. Since call graphs are an essential starting point for all interprocedural analyses, many tools and frameworks have been developed to generate the call graph of a given pr...
Karim Ali, Ondrej Lhoták
COCOON
2009
Springer
14 years 2 months ago
An Attacker-Defender Game for Honeynets
A honeynet is a portion of routed but otherwise unused address space that is instrumented for network traffic monitoring. It is an invaluable tool for understanding unwanted Intern...
Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul ...
DBSEC
2006
131views Database» more  DBSEC 2006»
13 years 8 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
SIGMOD
2008
ACM
150views Database» more  SIGMOD 2008»
14 years 7 months ago
LearnPADS: automatic tool generation from ad hoc data
In this demonstration, we will present LEARNPADS, a fully automatic system for generating ad hoc data processing tools. When presented with a collection of ad hoc data, the system...
Kathleen Fisher, David Walker, Kenny Qili Zhu
ISSS
1998
IEEE
152views Hardware» more  ISSS 1998»
13 years 11 months ago
Code Generation for Compiled Bit-True Simulation of DSP Applications
Bit-true simulation veri es the nite word length choices in the VLSI implementation of a DSP application. Present-day bit-true simulation tools are time consuming. We elaborate a ...
Luc De Coster, Marleen Adé, Rudy Lauwereins...