Zobrazeno 1 - 10
of 104
pro vyhledávání: '"Locasto, Michael"'
HTTP/1.1 parsing discrepancies have been the basis for numerous classes of attacks against web servers. Previous techniques for discovering HTTP parsing discrepancies have focused on blackbox differential testing of HTTP gateway servers, despite evid
Externí odkaz:
http://arxiv.org/abs/2405.17737
Implementation flaws in cryptographic libraries, design flaws in underlying cryptographic primitives, and weaknesses in protocols using both, can all lead to exploitable vulnerabilities in software. Manually fixing such issues is challenging and reso
Externí odkaz:
http://arxiv.org/abs/2004.09713
Publikováno v:
In International Journal of Critical Infrastructure Protection July 2012 5(2):74-83
Virtual Extension The Ephemeral Legion: Producing an Expert Cyber-Security Work Force from Thin Air.
Autor:
Locasto, Michael E.1 locasto@ucalgary.ca, Ghosh, Anup K.2 aghosh1@gmu.edu, Jajodia, Sushil3 jajodia@gmu.edu, Stavrou, Angelos4 astavrou@gmu.edu
Publikováno v:
Communications of the ACM. Jan2011, Vol. 54 Issue 1, p129-131. 3p. 1 Color Photograph.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Locasto, Michael, Gonzalez, Robin
Patching software remains a key defensive technique for mitigating flaws and vulnerabilities. Patches, however, entail complications that are hard to predict. Patches can be incomplete or incorrect, thereby not fully addressing the targeted flaw or i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::af7249a8af86ce604bc9897de3d00a9c
Autor:
Bratus, Sergey, Locasto, Michael E., Otto, Boris, Shapiro, Rebecca, Smith, Sean W., Weaver, Gabriel
Despite the availability of powerful mechanisms for security policy and access control, real-world information security practitioners-both developers and security officers-still find themselves in need of something more. We believe that this is the c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_________2::a42fc642fecf9adc072fa59b2964178e
http://www.alexandria.unisg.ch/183170/
http://www.alexandria.unisg.ch/183170/
Autor:
Locasto, Michael E., Stavrou, Angelos, Cretu, Gabriela F., Keromytis, Angelos D., Stolfo, Salvatore
Current embryonic attempts at software self-healing produce mechanisms that are often oblivious to the semantics of the code they supervise. We believe that, in order to help inform runtime repair strategies, such systems require a more detailed anal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::029d6df8e6b0efa33033596974677021
Publikováno v:
2016 IEEE Security & Privacy Workshops (SPW); 2016, p140-155, 16p