Sciweavers

420 search results - page 21 / 84
» Using static analysis for Ajax intrusion detection
Sort
View
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
WCRE
2009
IEEE
14 years 2 months ago
Static Detection of Disassembly Errors
—Static disassembly is a crucial first step in reverse engineering executable files, and there is a considerable body of work in reverse-engineering of binaries, as well as are...
Nithya Krishnamoorthy, Saumya K. Debray, Keith Fli...
ESEC
1997
Springer
13 years 11 months ago
Applying Static Analysis to Software Architectures
Abstract. In this paper we demonstrate how static concurrency analysis techniques can be used to verify application-specific properties of an architecture description. Specifically...
Gleb Naumovich, George S. Avrunin, Lori A. Clarke,...
ACSAC
2006
IEEE
13 years 11 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
ACSAC
2008
IEEE
14 years 2 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu