Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Michael C. Millian"'
Autor:
Ira Ray Jenkins, Kartik Palani, Michael C. Millian, Syed H. Tanveer, J. Peter Brady, Sergey Bratus, Kirti V. Rathore, Sean W. Smith, Rebecca Shapiro, Vijay H. Kothari, Jason Reeves, Prashant Anantharaman
Publikováno v:
Modeling and Design of Secure Internet of Things. :529-562
Autor:
Ross Koppel, Sergey Bratus, Jim Blythe, Michael C. Millian, Sameed Ali, Prashant Anantharaman, Vijay H. Kothari, J. Peter Brady, Sean W. Smith, Ira Ray Jenkins
Publikováno v:
Security Protocols XXVII ISBN: 9783030570422
Security Protocols Workshop
Security Protocols Workshop
Human understanding of protocols is central to protocol security. The security of a protocol rests on its designers, its implementors, and, in some cases, its users correctly conceptualizing how it should work, understanding how it actually works, an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e1d55c9bdb8dfb7eef15b85dd3591cc8
https://doi.org/10.1007/978-3-030-57043-9_15
https://doi.org/10.1007/978-3-030-57043-9_15
Autor:
Michael C. Millian, Vijay H. Kothari
Publikováno v:
Security Protocols XXVII ISBN: 9783030570422
Security Protocols Workshop
Security Protocols Workshop
The origin of many protocol vulnerabilities is the human. Humans fail predictably, and they fail often. This paper is mostly dealing with how do we acknowledge these failures. Moreover, how do we start designing protocols in such ways that humans are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1692cc2a9ad0d26bc9553384b6ec0ee8
https://doi.org/10.1007/978-3-030-57043-9_16
https://doi.org/10.1007/978-3-030-57043-9_16
Autor:
Michael C. Millian, Vijay H. Kothari, Sameed Ali, Sergey Bratus, Ross Koppel, Sean W. Smith, Ira Ray Jenkins, Prashant Anantharaman, Jim Blythe, J. Peter Brady
Publikováno v:
Security Protocols XXVII ISBN: 9783030570422
Security Protocols Workshop
Security Protocols Workshop
Mismorphisms—instances where predicates take on different truth values across different interpretations of reality (notably, different actors’ perceptions of reality and the actual reality)—are the source of weird instructions. These weird inst
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::705eb5c52060a36ac5e8885b7b0d93fe
https://doi.org/10.1007/978-3-030-57043-9_11
https://doi.org/10.1007/978-3-030-57043-9_11
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783030346461
Critical Infrastructure Protection
IFIP Advances in Information and Communication Technology
13th International Conference on Critical Infrastructure Protection (ICCIP)
13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.73-85, ⟨10.1007/978-3-030-34647-8_4⟩
Critical Infrastructure Protection
IFIP Advances in Information and Communication Technology
13th International Conference on Critical Infrastructure Protection (ICCIP)
13th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2019, Arlington, VA, United States. pp.73-85, ⟨10.1007/978-3-030-34647-8_4⟩
Part 2: Infrastructure Protection; International audience; This chapter proposes a roadmap that employs secure parsers to eliminate the possibility of input-handling vulnerabilities in industrial control systems. Industrial control systems are respon
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::34f58f406bd8d150de92764f191ff0ea
https://doi.org/10.1007/978-3-030-34647-8_4
https://doi.org/10.1007/978-3-030-34647-8_4
Autor:
Patrick Flathers, Michael C. Millian, Jason Reeves, Vijay H. Kothari, Prashant Anantharaman, William G. Nisen, Sean W. Smith, J. Peter Brady, Nathan Reitinger
Publikováno v:
NSPW
From March 29, 2038, to April 6, 2038, the world observed the North American Blackout of 2038. The blackout left upwards of 300 million people without power, ravaged the world economy, and devastated the global internet. By many accounts, it was the
Publikováno v:
SecDev
Input-handling vulnerabilities have been a constant source of security problems for decades. Many famous recent bugs are in fact input-handling bugs. We argue that the techniques for writing parsers in its present form are insufficient, and hence we