Fine-grained and expressive access control policies on application resources need to be enforced in applicationlevel code. Uniformly enforcing a single policy (referred to as the ...
Tine Verhanneman, Frank Piessens, Bart De Win, Wou...
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
When will we be secure? Nobody knows for sure ā but it cannot happen before commercial security products and services possess not only enough functionality to satisfy customersā...
As evidenced by the proliferation of phishing attacks and keystroke loggers, we know that human beings are not wellequipped to make trust decisions about when to use their passwor...
Software model checking has become a popular tool for verifying programsā behavior. Recent results suggest that it is viable for ļ¬nding and eradicating security bugs quickly. ...
Benjamin Schwarz, Hao Chen, David Wagner, Jeremy L...
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
Coordinating multiple overlapping defense mechat diļ¬ering levels of abstraction, is fraught with the potential for misconļ¬guration, so there is strong motivation to generate p...
Paul Rubel, Michael Ihde, Steven Harp, Charles Pay...
IP networks fundamentally rely on the Address Resolution Protocol (ARP) for proper operation. Unfortunately, vulnerabilities in the ARP protocol enable a raft of IP-based imperson...