Sciweavers

PST
2008
14 years 1 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
PST
2008
14 years 1 months ago
Model-Checking for Software Vulnerabilities Detection with Multi-Language Support
In this paper we develop a security verification framework for open source software with a multi-language support. We base our approach on the GCC compiler which is considered as ...
Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Moura...
PST
2008
14 years 1 months ago
Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data
Knowledge discovery systems extract knowledge from data that can be used for making prediction about incomplete data items. Utility is a measure of the usefulness of the discovere...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
PST
2008
14 years 1 months ago
Encoding the Program Correctness Proofs as Programs in PCC Technology
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating and storing the proofs which are inh...
Heidar Pirzadeh, Danny Dubé
PST
2008
14 years 1 months ago
LogView: Visualizing Event Log Clusters
Event logs or log files form an essential part of any network management and administration setup. While log files are invaluable to a network administrator, the vast amount of dat...
Adetokunbo Makanju, Stephen Brooks, A. Nur Zincir-...
PST
2008
14 years 1 months ago
An Effective Defense against Intrusive Web Advertising
Intrusive Web advertising such as pop-ups and animated layer ads, which distract the user from reading or navigating through the main content of Web pages, is being perceived as a...
Viktor Krammer
PST
2008
14 years 1 months ago
Cross-Language Weaving Approach Targeting Software Security Hardening
In this paper, we propose an approach for systematic security hardening of software based on aspect-oriented programming and Gimple language. We also present the first steps towar...
Azzam Mourad, Dima Alhadidi, Mourad Debbabi
PST
2008
14 years 1 months ago
Unlinkable Communication
In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols e...
Volker Fusenig, Eugen Staab, Uli Sorger, Thomas En...
PST
2008
14 years 1 months ago
Investigating Two Different Approaches for Encrypted Traffic Classification
The basic objective of this work is to compare the utility of an expert driven system and a data driven system for classifying encrypted network traffic, specifically SSH traffic ...
Riyad Alshammari, A. Nur Zincir-Heywood
PST
2008
14 years 1 months ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...