نشرت في: April 2009
A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication mechanism. A network cove...
نشرت في: October 2009
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and mak...
We examine the problem of keyboard acoustic emanations.We present a novel attack taking as input a 10-minute sound recording of a user typing English...
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, control-flow integr...
We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions...