Sciweavers

441 search results - page 18 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
CN
2007
137views more  CN 2007»
13 years 9 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
ISARCS
2010
164views Hardware» more  ISARCS 2010»
13 years 12 months ago
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Abstract. Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are in...
Daniel Germanus, Abdelmajid Khelil, Neeraj Suri
ACSW
2007
13 years 11 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...
CCS
2005
ACM
14 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
CONEXT
2007
ACM
13 years 11 months ago
An AS-level IP traceback system
Distributed Denial of Service (DDoS) attacks represent a serious threat to the appropriate operation of Internet services. To deal with this threat, we propose an IP traceback sys...
André O. Castelucio, Ronaldo M. Salles, Art...