Sciweavers

381 search results - page 49 / 77
» host 2008
Sort
View
DIMVA
2010
13 years 9 months ago
Organizing Large Scale Hacking Competitions
Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting. In recent years, a number of different security co...
Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, L...
SP
2008
IEEE
14 years 2 months ago
Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P′ , automatically generate an exploit for the potentially unknow...
David Brumley, Pongsin Poosankam, Dawn Xiaodong So...
CEAS
2008
Springer
13 years 9 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
NOMS
2008
IEEE
120views Communications» more  NOMS 2008»
14 years 2 months ago
SGNET: Implementation insights
—We present in this paper SGNET, a distributed framework to collect information on Internet attacks, with special attention to self-propagating malware and code injections. This ...
Corrado Leita, Marc Dacier
ICIP
2008
IEEE
14 years 9 months ago
Peer-to-peer multicast live video streaming with interactive virtual pan/tilt/zoom functionality
Video streaming with virtual pan/tilt/zoom functionality allows the viewer to watch arbitrary regions of a high-spatial-resolution scene. In our proposed system, the user controls...
Aditya Mavlankar, Jeonghun Noh, Pierpaolo Bacciche...