Sciweavers

1028 search results - page 61 / 206
» Using Attack Graphs to Design Systems
Sort
View
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 8 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
CCS
2008
ACM
14 years 10 days ago
Measuring network security using dynamic bayesian network
Given the increasing dependence of our societies on networked information systems, the overall security of these systems should be measured and improved. Existing security metrics...
Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushi...
ACSAC
2010
IEEE
13 years 8 months ago
A framework for testing hardware-software security architectures
New security architectures are difficult to prototype and test at the design stage. Fine-grained monitoring of the interactions between hardware, the operating system, and applica...
Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-...
VR
2002
IEEE
210views Virtual Reality» more  VR 2002»
14 years 3 months ago
Distributed Applications for Collaborative Augmented Reality
This paper focuses on the distributed architecture of the collaborative augmented reality system Studierstube. The system allows multiple users to experience a shared 3D workspace...
Dieter Schmalstieg, Gerd Hesina
SOSP
2007
ACM
14 years 7 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...