Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Ata de Congresso
|
![]() |
Static detection of cross-site scripting vulnerabilitiesWassermann, Gary ; Su, Zhendong2008 ACM/IEEE 30th International Conference on Software Engineering, 2008, Vol.2008 (24), p.171-180New York, NY, USA: ACMTexto completo disponível |
2 |
Material Type: Ata de Congresso
|
![]() |
Network vulnerability assessment using Bayesian networksLiu, Yu ; Man, HongProc. SPIE, 2005, Vol.5812, p.61-71Bellingham WA: SPIETexto completo disponível |
3 |
Material Type: Ata de Congresso
|
![]() |
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability DetectionTielei Wang ; Tao Wei ; Guofei Gu ; Wei Zou2010 IEEE Symposium on Security and Privacy, 2010, p.497-512IEEETexto completo disponível |
4 |
Material Type: Ata de Congresso
|
![]() |
Eliminating microarchitectural dependency from Architectural VulnerabilitySridharan, V. ; Kaeli, D.R.2009 IEEE 15th International Symposium on High Performance Computer Architecture, 2009, p.117-128IEEETexto completo disponível |
5 |
Material Type: Ata de Congresso
|
![]() |
Scalable, graph-based network vulnerability analysisAmmann, Paul ; Wijesekera, Duminda ; Kaushik, Saket Atluri, VijayConference on Computer and Communications Security: Proceedings of the 9th ACM conference on Computer and communications security; 18-22 Nov. 2002, 2002, p.217-224New York, NY, USA: ACMTexto completo disponível |
6 |
Material Type: Ata de Congresso
|
![]() |
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAsMoradi, Amir ; Barenghi, Alessandro ; Kasper, Timo ; Paar, ChristofProceedings of the 18th ACM conference on Computer and communications security, 2011, p.111-124New York, NY, USA: ACMTexto completo disponível |
7 |
Material Type: Ata de Congresso
|
![]() |
State of the Art: Automated Black-Box Web Application Vulnerability TestingBau, Jason ; Bursztein, Elie ; Gupta, Divij ; Mitchell, John2010 IEEE Symposium on Security and Privacy, 2010, p.332-345IEEETexto completo disponível |
8 |
Material Type: Ata de Congresso
|
![]() |
Pixy: a static analysis tool for detecting Web application vulnerabilitiesJovanovic, N. ; Kruegel, C. ; Kirda, E.2006 IEEE Symposium on Security and Privacy (S&P'06), 2006, p.6 pp.-263IEEETexto completo disponível |
9 |
Material Type: Ata de Congresso
|
![]() |
Towards automatic generation of vulnerability-based signaturesBrumley, D. ; Newsome, J. ; Song, D. ; Hao Wang ; Somesh Jha2006 IEEE Symposium on Security and Privacy (S&P'06), 2006, p.15 pp.-16IEEETexto completo disponível |
10 |
Material Type: Ata de Congresso
|
![]() |
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacksSun, Yan Lindsay ; Han, Zue ; Yu, Wei ; Liu, K.J. RayProceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006, p.1-13IEEETexto completo disponível |