Sciweavers

SP
2006
IEEE
177views Security Privacy» more  SP 2006»
14 years 6 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
14 years 6 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 6 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
14 years 6 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
14 years 6 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
SP
2006
IEEE
14 years 6 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson
SP
2006
IEEE
129views Security Privacy» more  SP 2006»
14 years 6 months ago
Practical Inference Control for Data Cubes (Extended Abstract)
Yingjiu Li, Haibing Lu, Robert H. Deng
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 6 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 6 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
SP
2006
IEEE
108views Security Privacy» more  SP 2006»
14 years 6 months ago
Cache Cookies for Browser Authentication (Extended Abstract)
Ari Juels, Markus Jakobsson, Tom N. Jagatic