Sciweavers

ESORICS
2011
Springer
13 years 5 days ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri
COMPSAC
2011
IEEE
13 years 7 days ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
USS
2010
13 years 10 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
PST
2004
14 years 1 months ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
NSDI
2008
14 years 2 months ago
BFT Protocols Under Fire
Much recent work on Byzantine state machine replication focuses on protocols with improved performance under benign conditions (LANs, homogeneous replicas, limited crash faults), ...
Atul Singh, Tathagata Das, Petros Maniatis, Peter ...
ASWEC
2004
IEEE
14 years 4 months ago
ASPIRE: Automated Systematic Protocol Implementation Robustness Evaluation
Network protocol implementations are susceptible to problems caused by their lack of ability to handle invalid inputs. We present ASPIRE: Automated Systematic Protocol Implementat...
Arunchandar Vasan, Atif M. Memon
IWACA
1994
126views Multimedia» more  IWACA 1994»
14 years 4 months ago
An Object-Oriented Implementation of the Xpress Transfer Protocol
Abstract. Object-oriented design principles map well onto protocol implementations because protocols essentially manipulate two structures--packets and the states of the endpoints....
W. Timothy Strayer, Simon Gray, Raymond E. Cline J...