-
1
-
-
79959534939
-
Yet another microarchitectural attack: Exploiting i-cache
-
New York, NY, USA ACM
-
ACIIÇMEZ, O. Yet another microarchitectural attack: exploiting i-cache. In CSAW '07: Proceedings of the 2007 ACM workshop on Computer security architecture (New York, NY, USA, 2007), ACM, pp. 11-18.
-
(2007)
CSAW '07: Proceedings of the 2007 ACM Workshop on Computer Security Architecture
, pp. 11-18
-
-
Aciiçmez, O.1
-
2
-
-
84876307879
-
On the power of simple branch prediction analysis
-
New York, NY, USA ACM
-
ACIIÇMEZ, O., KOÇ, C. K., AND SEIFERT, J.-P. On the power of simple branch prediction analysis. In ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security (New York, NY, USA, 2007), ACM, pp. 312-320.
-
(2007)
ASIACCS '07: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
, pp. 312-320
-
-
Aciiçmez, O.1
Koç, C.K.2
Seifert, J.-P.3
-
3
-
-
78149305944
-
-
Available at last Accessed March 2010, 2010
-
AMAZON. The Amazon Elastic Compute Cloud (EC2) Available at http://aws.amazon.com/ec2/, last accessed March 2010, 2010.
-
The Amazon Elastic Compute Cloud (EC2)
-
-
-
5
-
-
72449189555
-
Hedged public-key encryption: How to protect against bad randomness
-
BELLARE, M., BRAKERSKI, Z., NAOR, M., RISTENPART, T., SEGEV, G., SHACHAM, H., AND YILEK, S. Hedged public-key encryption: How to protect against bad randomness. In ASIACRYPT (2009), pp. 232-249.
-
(2009)
ASIACRYPT
, pp. 232-249
-
-
Bellare, M.1
Brakerski, Z.2
Naor, M.3
Ristenpart, T.4
Segev, G.5
Shacham, H.6
Yilek, S.7
-
6
-
-
80455147668
-
-
Available at last Accessed June 2010, 2010
-
BOTO. boto - Python interface to Amazon Web Services. Available at http://code.google.com/p/boto/, last accessed June 2010, 2010.
-
Boto - Python Interface to Amazon Web Services
-
-
-
7
-
-
74049133176
-
Cloud security is not (Just) virtualization security
-
New York, NY, USA ACM
-
CHRISTODORESCU, M., SAILER, R., SCHALES, D. L., SGANDURRA, D., AND ZAMBONI, D. Cloud Security Is Not (Just) Virtualization Security. In CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security (New York, NY, USA, 2009), ACM, pp. 97-102.
-
(2009)
CCSW '09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 97-102
-
-
Christodorescu, M.1
Sailer, R.2
Schales, D.L.3
Sgandurra, D.4
Zamboni, D.5
-
9
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
GARFINKEL, T., PFAFF, B., CHOW, J., ROSENBLUM, M., AND BONEH, D. Terra: A Virtual Machine-Based Platform for Trusted Computing. SIGOPS Oper. Syst. Rev. 37, 5 (2003), 193-206.
-
(2003)
SIGOPS Oper. Syst. Rev.
, vol.37
, Issue.5
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
10
-
-
84890929497
-
Introduction to visualization for computer security
-
GOODALL, J. R. Introduction to Visualization for Computer Security. In VizSEC (2007), pp. 1-17.
-
(2007)
VizSEC
, pp. 1-17
-
-
Goodall, J.R.1
-
11
-
-
79960238976
-
-
Springer ch. Topological Vulnerability Analysis
-
JAJODIA, S., LIU, P., SWARUP, V., AND WANG, C. Cyber Situational Awareness: Issues and Research. Springer, 2009, ch. Topological Vulnerability Analysis, pp. 139-154.
-
(2009)
Cyber Situational Awareness: Issues and Research
, pp. 139-154
-
-
Jajodia, S.1
Liu, P.2
Swarup, V.3
Wang, C.4
-
12
-
-
78650118210
-
-
World Scientific Press ch. Topological Vulnerability Analysis: A Powerful New Approach for Network Attack Prevention, Detection, and Response
-
JAJODIA, S., AND NOEL, S. Algorithms, Architectures, and Information Systems Security. World Scientific Press, 2007, ch. Topological Vulnerability Analysis: A Powerful New Approach for Network Attack Prevention, Detection, and Response.
-
(2007)
Algorithms, Architectures, and Information Systems Security
-
-
Jajodia, S.1
Noel, S.2
-
15
-
-
70349106987
-
Innovations for grid security from trusted computing
-
LNCS, Springer-Verlag
-
MAO, W., MARTIN, A., JIN, H., AND ZHANG, H. Innovations for grid security from trusted computing. In Fourteenth International Workshop on Security Protocols (2006), LNCS, Springer-Verlag.
-
(2006)
Fourteenth International Workshop on Security Protocols
-
-
Mao, W.1
Martin, A.2
Jin, H.3
Zhang, H.4
-
17
-
-
51049107864
-
-
Available at last accessed June 2010, June
-
MELL, P., SCARFONE, K., AND ROMANOSKY, S. A Complete Guide to the Common Vulnerability Scoring System Version 2.0. Available at http://www.first.org/ cvss/cvss-guide.html, last accessed June 2010, June 2007.
-
(2007)
A Complete Guide to the Common Vulnerability Scoring System Version 2.0
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
18
-
-
78650151286
-
-
Available at last Accessed June 2010
-
NETWORKX DEVELOPERS. NetworkX. Available at http://networkx.lanl.gov/, last accessed June 2010, 2010.
-
(2010)
NetworkX
-
-
-
19
-
-
66249091938
-
Advances in topological vulnerability analysis
-
Washington, DC, USA IEEE Computer Society
-
NOEL, S., ELDER, M., JAJODIA, S., KALAPA, P., O'HARE, S., AND PROLE, K. Advances in Topological Vulnerability Analysis. In CATCH '09: Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security (Washington, DC, USA, 2009), IEEE Computer Society, pp. 124-129.
-
(2009)
CATCH '09: Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security
, pp. 124-129
-
-
Noel, S.1
Elder, M.2
Jajodia, S.3
Kalapa, P.4
O'Hare, S.5
Prole, K.6
-
22
-
-
84988504967
-
A graph-based system for network-vulnerability analysis
-
New York, NY, USA ACM
-
PHILLIPS, C., AND SWILER, L. P. A graph-based system for network-vulnerability analysis. In NSPW '98: Proceedings of the 1998 workshop on New security paradigms (New York, NY, USA, 1998), ACM, pp. 71-79.
-
(1998)
NSPW '98: Proceedings of the 1998 Workshop on New Security Paradigms
, pp. 71-79
-
-
Phillips, C.1
Swiler, L.P.2
-
23
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA ACM
-
RISTENPART, T., TROMER, E., SHACHAM, H., AND SAVAGE, S. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security (New York, NY, USA, 2009), ACM, pp. 199-212.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
26
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
Washington, DC, USA IEEE Computer Society
-
SHEYNER, O., HAINES, J., JHA, S., LIPPMANN, R., AND WING, J. M. Automated Generation and Analysis of Attack Graphs. In SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2002), IEEE Computer Society, p. 273.
-
(2002)
SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 273
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
28
-
-
84964504906
-
Computer-attack graph generation tool
-
2
-
SWILER, L., PHILLIPS, C., ELLIS, D., AND CHAKERIAN, S. Computer-attack graph generation tool. In DARPA Information Survivability Conference Exposition II, 2001. DISCEX '01. Proceedings (2001), vol. 2, pp. 307-321 vol.2.
-
(2001)
DARPA Information Survivability Conference Exposition II, 2001. DISCEX '01. Proceedings
, vol.2
, pp. 307-321
-
-
Swiler, L.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
-
29
-
-
1042267106
-
-
Sandia National Laboratories, Albuquerque, New ACM Press
-
SWILER, L. P., PHILLIPS, C., AND GAYLOR, T. A Graph-Based Network-Vulnerability Analysis System. In Sandia National Laboratories, Albuquerque, New (1997), ACM Press, pp. 97-3010.
-
(1997)
A Graph-Based Network-Vulnerability Analysis System
, pp. 97-3010
-
-
Swiler, L.P.1
Phillips, C.2
Gaylor, T.3
-
30
-
-
78650159513
-
-
Available at last Accessed March 2010
-
TENABLE NETWORK SECURITY. Nessus, the Network Vulnerability Scanner. Available at http://www.nessus.org, last accessed March 2010, 2010.
-
(2010)
Nessus, the Network Vulnerability Scanner
-
-
-
31
-
-
85028538564
-
PolicyVis: Firewall security policy visualization and inspection
-
Berkeley, CA, USA USENIX Association
-
TRAN, T., AL-SHAER, E., AND BOUTABA, R. PolicyVis: Firewall Security Policy Visualization and Inspection. In LISA'07: Proceedings of the 21st conference on Large Installation System Administration Conference (Berkeley, CA, USA, 2007), USENIX Association, pp. 1-16.
-
(2007)
LISA'07: Proceedings of the 21st Conference on Large Installation System Administration Conference
, pp. 1-16
-
-
Tran, T.1
Al-Shaer, E.2
Boutaba, R.3
-
32
-
-
78650084931
-
An interactive attack graph cascade and reachability display
-
WILLIAMS, L., LIPPMANN, R., AND INGOLS, K. An Interactive Attack Graph Cascade and Reachability Display. In VizSEC (2007), pp. 221-236.
-
(2007)
VizSEC
, pp. 221-236
-
-
Williams, L.1
Lippmann, R.2
Ingols, K.3
-
33
-
-
56449105709
-
GARNET: A graphical attack graph and reachability network evaluation tool
-
Berlin, Heidelberg Springer-Verlag
-
WILLIAMS, L., LIPPMANN, R., AND INGOLS, K. GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. In VizSec '08: Proceedings of the 5th international workshop on Visualization for Computer Security (Berlin, Heidelberg, 2008), Springer-Verlag, pp. 44-59.
-
(2008)
VizSec '08: Proceedings of the 5th International Workshop on Visualization for Computer Security
, pp. 44-59
-
-
Williams, L.1
Lippmann, R.2
Ingols, K.3
-
34
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
WOOL, A. A Quantitative Study of Firewall Configuration Errors. Computer 37, 6 (2004), 62-67.
-
(2004)
Computer
, vol.37
, Issue.6
, pp. 62-67
-
-
Wool, A.1
|