Sciweavers

SOCIALCOM
2010
13 years 9 months ago
On the Navigability of Social Tagging Systems
It is a widely held belief among designers of social tagging systems that tag clouds represent a useful tool for navigation. This is evident in, for example, the increasing number ...
Denis Helic, Christoph Trattner, Markus Strohmaier...
SICHERHEIT
2010
13 years 9 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
SICHERHEIT
2010
13 years 9 months ago
Session Fixation - The Forgotten Vulnerability?
Michael Schrank, Bastian Braun, Martin Johns, Joac...
SICHERHEIT
2010
13 years 9 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen
SICHERHEIT
2010
13 years 9 months ago
CAPTCHAs: The Good, the Bad, and the Ugly
A CAPTCHA is a program that generates challenges that are easy to solve for humans but difficult to solve for computers. The most common CAPTCHAs today are text-based ones where a ...
Paul Baecher, Marc Fischlin, Lior Gordon, Robert L...
SICHERHEIT
2010
13 years 9 months ago
Bedrohungsmodellierung (Threat Modeling) in der Softwareentwicklung
: Threat Modeling erm
Fabian Schwab, Alexander Findeisen, Peter Sakal, H...
SICHERHEIT
2010
13 years 9 months ago
Amun: Automatic Capturing of Malicious Software
: This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the ...
Jan Göbel
SICHERHEIT
2010
13 years 9 months ago
Quantifying the Attack Surface of a Web Application
Abstract: The attack surface of a system represents the exposure of application objects to attackers and is affected primarily by architecture and design decisions. Given otherwise...
Thomas Heumann, Sven Türpe, Jörg Keller
SICHERHEIT
2010
13 years 9 months ago
Towards Optimal Sensor Placement Strategies for Early Warning Systems
: A network early warning system consists of several distributed sensors to detect malicious network activity. The effectiveness of such early warning systems critically depends on...
Jan Göbel, Philipp Trinius
SICHERHEIT
2010
13 years 9 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...