Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleMay 2009
Snapshot Filtering Based on Resource-Usage Profiles
SADFE '09: Proceedings of the 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic EngineeringPages 15–21https://doi.org/10.1109/SADFE.2009.15Live forensic tools provide investigators with new sources of information. Unfortunately, the amount of data gathered by such tools can be overwhelming, with a low signal-to-noise ratio.The authors use an innovative method of monitoring the resource use ...
- ArticleDecember 2006
Modular Behavior Profiles in Systems with Shared Libraries (Short Paper)
AbstractModern computing environments depend on extensive shared libraries. In this paper, we propose monitoring the calls between those libraries as a new source of data for host-based anomaly detection. That is, we characterize an application by its use ...
- ArticleSeptember 2005
Empirical privilege profiling
NSPW '05: Proceedings of the 2005 workshop on New security paradigmsPages 111–118https://doi.org/10.1145/1146269.1146294The well-known Principle of Least Privilege states that a program should run with the minimal authority that it requires to get the job done, and no more. However, application of the principle has been left to software developers, developers of ...
- ArticleDecember 2004
Themes and Highlights of the New Security Paradigms Workshop 2004
ACSAC '04: Proceedings of the 20th Annual Computer Security Applications ConferencePages 382–383https://doi.org/10.1109/CSAC.2004.42This panel highlights a selection of the most interesting and provocative papers from the 2004 New Security Paradigms Workshop. This workshop was held September 2004 - the URL for more information is (http://www.nspw.org). The panel consists of authors ...
- ArticleSeptember 2002
An evolutionary approach to cyber security
NSPW '02: Proceedings of the 2002 workshop on New security paradigmsPages 108–109https://doi.org/10.1145/844102.844121Reducing the risks introduced with large new systems requires rethinking the way we build systems. Today's computer systems are built according to traditional engineering models, which emphasize simplicity and efficiency but which introduce an ...
- proceedingSeptember 2002
NSPW '02: Proceedings of the 2002 workshop on New security paradigms
Welcome to the Proceedings of the New Security Paradigms Workshop 2002. This was the eleventh year of our very special workshop. The truly great ideas resulting from this year's workshop are fight here for your consideration and enjoyment.If you find ...
- ArticleMay 1995
Formal methods in the THETA kernel
Abstract: THETA is a secure distributed operating system designed to run on a variety of hardware platforms. We are currently undertaking an effort to formally specify and implement a new THETA kernel to improve its security properties and to increase ...
- research-articleSeptember 1990
Formal Verification of Ada Programs
IEEE Transactions on Software Engineering (ISOF), Volume 16, Issue 9Pages 1058–1075https://doi.org/10.1109/32.58790The Penelope verification editor and its formal basis are described. Penelope is a prototype system for the interactive development and verification of programs that are written in a rich subset of sequential Ada. Because it generates verification ...
- ArticleJanuary 1986
Remote attribute updating for language-based editors
POPL '86: Proceedings of the 13th ACM SIGACT-SIGPLAN symposium on Principles of programming languagesPages 1–13https://doi.org/10.1145/512644.512645A major drawback to the use of attribute grammars in language-based editors has been that attributes can only depend on neighboring attributes in a program's syntax tree. This paper concerns new attribute-grammar-based methods that, for a suitable class ...