Zobrazeno 1 - 10
of 11
pro vyhledávání: '"W. Michael Petullo"'
Autor:
W. Michael Petullo
Publikováno v:
Cyber Security Experimentation and Test Workshop.
Publikováno v:
SOSR
Advanced Persistent Threats (APTs) commonly use stepping stone attacks that allow the adversary to move laterally undetected within an enterprise network towards a target. Existing network security techniques provide limited protection against such a
Publikováno v:
MIST@CCS
VisorFlow aims to monitor the flow of information between processes without requiring modifications to the operating system kernel or its userspace. VisorFlow runs in a privileged Xen domain and monitors the system calls executing in other domains ru
Publikováno v:
MIST@CCS
Most access control systems prohibit illicit actions at the moment they seem to violate a security policy. While effective, such early action often clouds insight into the intentions behind negligent or willful security policy violations. Furthermore
Autor:
W. Michael Petullo, Joseph Suh
Publikováno v:
IEEE Symposium on Security and Privacy Workshops
The Ethos operating system provides a number of features which aid programmers as they craft robust computer programs. One such feature of Ethos is its distributed, mandatory type system -- Etypes. Etypes provides three key properties: (1) every Etho
Autor:
W. Michael Petullo, Leo St. Amour
Publikováno v:
Security, Privacy, and Applied Cryptography Engineering ISBN: 9783319241258
SPACE
SPACE
Research has revealed a number of pitfalls inherent in contemporary TLS libraries. Common mistakes when programming using their APIs include insufficient certificate verification and the use of weak cipher suites. These programmer errors leave applic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::584516f698a39b13d11e3601e55e1f87
https://doi.org/10.1007/978-3-319-24126-5_5
https://doi.org/10.1007/978-3-319-24126-5_5
Publikováno v:
IEEE Symposium on Security and Privacy Workshops
Programming languages have long incorporated type safety, increasing their level of abstraction and thus aiding programmers. Type safety eliminates whole classes of security-sensitive bugs, replacing the tedious and error-prone search for such bugs i
Publikováno v:
Proceedings of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS'13, Berlin, Germany, November 4-8, 2013), 425-438
STARTPAGE=425;ENDPAGE=438;TITLE=Proceedings of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS'13, Berlin, Germany, November 4-8, 2013)
ACM Conference on Computer and Communications Security
STARTPAGE=425;ENDPAGE=438;TITLE=Proceedings of the 20th ACM SIGSAC Conference on Computer and Communications Security (CCS'13, Berlin, Germany, November 4-8, 2013)
ACM Conference on Computer and Communications Security
Minimal Latency Tunneling (MinimaLT) is a new network protocol that provides ubiquitous encryption for maximal confidentiality, including protecting packet headers. MinimaLT provides server and user authentication, extensive Denial-of-Service protect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7b4955655d018cb9500cbb5c86043501
https://research.tue.nl/nl/publications/e2fc90e0-ae80-4623-bc1a-07b9b478ae2f
https://research.tue.nl/nl/publications/e2fc90e0-ae80-4623-bc1a-07b9b478ae2f
Autor:
Jon A. Solworth, W. Michael Petullo
Publikováno v:
Digital Identity Management
Certificate systems often provide a foundation for distributed system security. A certificate is a signed statement; the user's private key must have been used to create the certificate's signature and the resulting certificate is tamper evident. Des
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.