Search Results - "21st Annual Computer Security Applications Conference (ACSAC'05)"
-
1
Graphical passwords: a survey
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For…”
Get full text
Conference Proceeding -
2
Building a MAC-based security architecture for the Xen open-source hypervisor
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security…”
Get full text
Conference Proceeding -
3
Dynamic taint propagation for Java
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…Improperly validated user input is the underlying root cause for a wide variety of attacks on Web-based applications. Static approaches for detecting this…”
Get full text
Conference Proceeding -
4
ScriptGen: an automated script generation tool for Honeyd
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…Honeyd (N. Provos, 2004) is a popular tool developed by Niels Provos that offers a simple way to emulate services offered by several machines on a single PC…”
Get full text
Conference Proceeding -
5
Intrusion detection in RBAC-administered databases
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…A considerable effort has been recently devoted to the development of database management systems (DBMS) which guarantee high assurance security and privacy…”
Get full text
Conference Proceeding -
6
Understanding complex network attack graphs through clustered adjacency matrices
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency…”
Get full text
Conference Proceeding -
7
A host-based approach to network attack chaining analysis
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent…”
Get full text
Conference Proceeding -
8
Looking back at the Bell-La Padula model
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering…”
Get full text
Conference Proceeding -
9
Strengthening software self-checksumming via self-modifying code
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al…”
Get full text
Conference Proceeding -
10
User-centered security: stepping up to the grand challenge
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain…”
Get full text
Conference Proceeding -
11
A Nitpicker's guide to a minimal-complexity secure GUI
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…Malware such as Trojan horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today's…”
Get full text
Conference Proceeding -
12
The Pump: a decade of covert fun
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…This paper traces the ten plus year history of the Naval Research Laboratory's Pump idea. The Pump was theorized, designed, and built at the Naval Research…”
Get full text
Conference Proceeding -
13
Stealth breakpoints
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary…”
Get full text
Conference Proceeding -
14
Replay attack in TCG specification and solution
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…We prove the existence of a flaw which we individuated in the design of the object-independent authorization protocol (OIAP), which represents one of the…”
Get full text
Conference Proceeding -
15
Model checking an entire Linux distribution for security violations
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…Software model checking has become a popular tool for verifying programs' behavior. Recent results suggest that it is viable for finding and eradicating…”
Get full text
Conference Proceeding -
16
Building evidence graphs for network forensics analysis
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…In this paper, we present techniques for a network forensics analysis mechanism that includes effective evidence presentation, manipulation and automated…”
Get full text
Conference Proceeding -
17
Survivability architecture of a mission critical system: the DPASA example
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…Many techniques and mechanisms exist today, some COTS, others less mature research products that can be used to deflect, detect, or even recover from specific…”
Get full text
Conference Proceeding -
18
Automatic generation of buffer overflow attack signatures: an approach based on program behavior models
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…Buffer overflows have become the most common target for network-based attacks. They are also the primary mechanism used by worms and other forms of automated…”
Get full text
Conference Proceeding -
19
Privacy-preserving alert correlation: a concept hierarchy based approach
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…With the increasing security threats from infrastructure attacks such as worms and distributed denial of service attacks, it is clear that the cooperation…”
Get full text
Conference Proceeding -
20
TARP: ticket-based address resolution protocol
Published in 21st Annual Computer Security Applications Conference (ACSAC'05) (2005)“…IP networks fundamentally rely on the address resolution protocol (ARP) for proper operation. Unfortunately, vulnerabilities in the ARP protocol enable a raft…”
Get full text
Conference Proceeding