Sciweavers

98 search results - page 7 / 20
» Vulnerability Discovery with Attack Injection
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
Known/Chosen Key Attacks against Software Instruction Set Randomization
Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomiz...
Yoav Weiss, Elena Gabriela Barrantes
CDC
2010
IEEE
172views Control Systems» more  CDC 2010»
12 years 10 months ago
Electrical centrality measures for electric power grid vulnerability analysis
— This paper investigates measures of centrality that are applicable to power grids. Centrality measures are used in network science to rank the relative importance of nodes and ...
Zhifang Wang, Anna Scaglione, Robert J. Thomas
MICCAI
2005
Springer
14 years 8 months ago
Intravascular Ultrasound-Based Imaging of Vasa Vasorum for the Detection of Vulnerable Atherosclerotic Plaque
Vulnerable plaques are dangerous atherosclerotic lesions that bear a high risk of complications that can lead to heart attacks and strokes. These plaques are known to be chronicall...
Sean M. O'Malley, Manolis Vavuranakis, Morteza Nag...
DSD
2009
IEEE
152views Hardware» more  DSD 2009»
13 years 11 months ago
ARROW - A Generic Hardware Fault Injection Tool for NoCs
Todays NoCs are reaching a level where it is getting very hard to ensure 100% of functionality. Consequently, fault tolerance has become an important aspect in todays design techn...
Michael Birner, Thomas Handl
ECWEB
2007
Springer
162views ECommerce» more  ECWEB 2007»
14 years 1 months ago
Impact of Relevance Measures on the Robustness and Accuracy of Collaborative Filtering
The open nature of collaborative recommender systems present a security problem. Attackers that cannot be readily distinguished from ordinary users may inject biased profiles, deg...
Jeff J. Sandvig, Bamshad Mobasher, Robin D. Burke