Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Meredith L. Patterson"'
Autor:
Dan Hirsch, Ingemar Markström, Meredith L. Patterson, Anders Sandberg, Mikael Vejdemo-Johansson
Publikováno v:
PeerJ Computer Science, Vol 1, p e2 (2015)
We extend the existing enumeration of neck tie-knots to include tie-knots with a textured front, tied with the narrow end of a tie. These tie-knots have gained popularity in recent years, based on reconstructions of a costume detail from The Matrix R
Externí odkaz:
https://doaj.org/article/11770e7513304887a67f43caade249d8
Publikováno v:
SecDev
Input-handling vulnerabilities have been a constant source of security problems for decades. Many famous recent bugs are in fact input-handling bugs. We argue that the techniques for writing parsers in its present form are insufficient, and hence we
Autor:
Sergey Bratus, Meredith L. Patterson, Trey Darley, Rebecca Shapiro, Michael E. Locasto, Anna Shubina
Publikováno v:
IEEE Security & Privacy. 12:83-87
Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense, security researchers must keep exploring novel ways to mit
Autor:
Sven M. Hallberg, Sergey Bratus, Sean W. Smith, Maxwell Koo, Meredith L. Patterson, Adam J. Crain, Daniel P. Hirsch
Publikováno v:
ICSS
We present an assurance methodology for producing significantly more secure implementations of SCADA/ICS protocols, and describe our case study of applying it to DNP3, in the form of a filtering proxy that deeply and exhaustively validates DNP3 messa
Publikováno v:
IEEE Systems Journal. 7:489-500
We present a formal language theory approach to improving the security aspects of protocol design and message-based interactions in complex composed systems. We argue that these aspects are responsible for a large share of modern computing systems' i
Publikováno v:
SecDev
Input-handling bugs share two common patterns: insufficient recognition, where input-checking logic is unfit to validate a program's assumptions about inputs, %leading to the code acting on invalid inputs, and parser differentials, wherein two or mor
Publikováno v:
IEEE Security & Privacy Magazine. 10:87-91
Jon Postel's Robustness Principle- "Be conservative in what you do, and liberal in what you accept from others"- played a fundamental role in how Internet protocols were designed and implemented. Its influence went far beyond direct application by In
Autor:
Meredith L. Patterson, Ingemar Markström, Mikael Vejdemo-Johansson, Anders Sandberg, Daniel P. Hirsch
Publikováno v:
PeerJ Computer Science, Vol 1, p e2 (2015)
We extend the existing enumeration of neck tie-knots to include tie-knots with a textured front, tied with the narrow end of a tie. These tie-knots have gained popularity in recent years, based on reconstructions of a costume detail from The Matrix R
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e65aa7f79087e1708013c01211f2775f
http://arxiv.org/abs/1401.8242
http://arxiv.org/abs/1401.8242