Sciweavers

302 search results - page 58 / 61
» Using Attack Injection to Discover New Vulnerabilities
Sort
View
NSPW
2004
ACM
14 years 13 days ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
WISEC
2010
ACM
14 years 2 months ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
COMPSAC
2009
IEEE
14 years 1 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
SP
2006
IEEE
169views Security Privacy» more  SP 2006»
14 years 1 months ago
A Safety-Oriented Platform for Web Applications
The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and ecommerce servic...
Richard S. Cox, Steven D. Gribble, Henry M. Levy, ...
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
13 years 11 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind