-
4
-
-
38149049950
-
Where Can an Insider Attack?
-
In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) vol.,. Springer, Heidelberg
-
Probst, C.W., Hansen, R.R., Nielson, F.: Where Can an Insider Attack? In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 127-142. Springer, Heidelberg (2007)
-
(2007)
FAST 2006. LNCS
, vol.4691
, pp. 127-142
-
-
Probst, C.W.1
Hansen, R.R.2
Nielson, F.3
-
6
-
-
84885045405
-
-
OpenSSH Development Team
-
OpenSSH Development Team., OpenSSH 4.21 (2004)
-
(2004)
OpenSSH 4.21
-
-
-
8
-
-
84885049979
-
-
CRHC Technical Report, UIUC, Champaign, IL
-
Pattabiraman, K., et al.: Discovering Application-level Insider Attacks using Symbolic Execution, CRHC Technical Report, UIUC, Champaign, IL (2008)
-
(2008)
Discovering Application-level Insider Attacks using Symbolic Execution
-
-
Pattabiraman, K.1
-
10
-
-
0038687692
-
Scalable, graph-based network vulnerability analysis
-
In: Washington
-
Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM conference on Computer and communications security. ACM, Washington (2002)
-
(2002)
Proceedings of the 9th ACM conference on Computer and communications security. ACM
-
-
Ammann, P.1
Wijesekera, D.2
Kaushik, S.3
-
12
-
-
0016971687
-
Symbolic execution and program testing
-
King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385-394 (1976)
-
(1976)
Commun. ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
15
-
-
78649862193
-
-
EECS Department, University of California, Berkeley
-
Molnar, D.A., Wagner, D.: Catchconv: Symbolic execution and run-time type inference for integer conversion errors, EECS Department, University of California, Berkeley (2007)
-
(2007)
Catchconv: Symbolic execution and run-time type inference for integer conversion errors
-
-
Molnar, D.A.1
Wagner, D.2
-
17
-
-
0031123369
-
Fault Injection Techniques and Tools
-
Hsueh, M.-C., Tsai, T.K., Iyer, R.K.: Fault Injection Techniques and Tools. IEEE Computer 30(4), 75-82 (1997)
-
(1997)
IEEE Computer
, vol.30
, Issue.4
, pp. 75-82
-
-
Hsueh, M.-C.1
Tsai, T.K.2
Iyer, R.K.3
-
18
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
In: Fumy, W. (ed.) Springer, Heidelberg
-
Boneh, D., DeMillo, R., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37-51. Springer, Heidelberg (1997)
-
(1997)
EUROCRYPT 1997. LNCS
, vol.1233
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.2
Lipton, R.J.3
-
19
-
-
84939573910
-
Differential Power Analysis
-
In: Wiener, M. (ed.) Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 388. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 388
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
|