نتایج جستجو برای: exploitations

تعداد نتایج: 442  

2001
Pao-Ann Hsiung Shu-Yu Cheng

Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often flatten out the behavior of a target system before verification. Inherent modularities, either explicit or implicit, functional or structural, are not exploited by these tools and algorithms. In this work, we show how as...

2009
Georg Carle Corinna Schmitt

This proceeding deals with various attacks and exploitations P2P networks have to cope with. In the last few years BitTorrent became famous for spreading big amounts of data to many people in a short time. BitTorrent will therefore be the main focus of this work. This proceeding serves basically as overview about different types of attacks. It shows attacks that are able to prevent files from b...

2007
Nicola Fanizzi Claudia d’Amato Floriana Esposito

The paper presents a clustering method which can be applied to populated ontologies for discovering interesting groupings of resources therein. The method exploits a simple, yet effective and languageindependent, semi-distance measure for individuals, that is based on their underlying semantics along with a number of dimensions corresponding to a set of concept descriptions (discriminating feat...

2014
Joris Costes Jean-Michel Ghidaglia Philippe Muguerra Keld Lund Nielsen Xavier Riou Jean-Philippe Saut Nicolas Vayatis

Offshore oil facilities are complex systems that involve elaborate physics combined with stochastic aspects related, for instance, to failure risk or price variation. Although there exist many dedicated software tools to simulate flows typically encountered in oil exploitations, there is still no tool that combines physical (mostly engineering fluid mechanics) and risk simulation. Such a tool c...

2007
Fabienne Moreau Vincent Claveau Pascale Sébillot

Taking into account in one same information retrieval system several linguistic indexes encoding morphological, syntactic, and semantic information seems a good idea to better grasp the semantic contents of large unstructured text collections and thus to increase performances of such a system. Therefore the problem raised is of knowing how to automatically and ef ciently combine those different...

2005
Gerrit Rothmaier Tobias Kneiphoff Heiko Krumm

Advanced network attacks utilize complex, intertwined sequences of events on different hosts instead of just plain vulnerability exploitations. These sequences may contain protocol execution steps, attacker, and administrator actions. We propose a SPIN based approach for formal modeling and analysis of such attack sequences in scenarios where both protocol and network level aspects are relevant...

2010

Return-oriented programming (ROP), based on return-to-libc and borrowed-code-chunks techniques, is one of the buzzing advanced exploitation techniques these days to bypass NX. There are several practical works using ROP techniques for exploitations on Windows, iPhone OS to bypass DEP and code signing. On most of modern Linux distributions, ASCIIArmor address mapping (which maps libc addresses s...

1997
Calvin Ko Manfred Ruschitzka Karl N. Levitt

This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that describe the intended behavior of programs and scans audit trails for operations that are in violation of the specifications. We developed a formal framework for specifying the security-relevant behavior of programs, on wh...

2012
María Constanza Lozano Mary Trujillo

Human beings consume protein-rich foods to supply their nutritional requirements, mainly of animal origin, such origin lying in meat from different species (cattle, sheep, caprines, birds, pigs, fish and seafood/shellfish), milk and eggs. With the exception of some products derived from fishing, these foods are obtained from financial exploitations in which the animals’ health must be guarantee...

2007
Satoshi Takahashi Chang-Jun Ahn

High-resolution radars (HRR) using ultra wideband (UWB) signals is a promising system for various detection and ranging applications. The radar resolution increases as a decrease of the pulse width, then radar echoes including background unwanted ones become spiky. Various modifications of constant false alarm rate (CFAR) and matched filters have been proposed to reduce false alarm induced by u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید