Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleAugust 2001
Defending against statistical steganalysis
The main purpose of steganography is to hide the occurrence of communication. While most methods in use today are invisible to an observer's senses, mathematical analysis may reveal statistical anomalies in the stego medium. These discrepancies expose ...
- ArticleAugust 2001
Secure distribution of events in content-based publish subscribe systems
Content-based publish-subscribe systems are an emerging paradigm for building a range of distributed applications. A specific problem in content-based systems is the secure distribution of events to clients subscribing to those events. In content-based ...
- ArticleAugust 2001
SC-CFS: smartcard secured cryptographic file system
Storing information securely is one of the most important roles expected for computer systems, but it is difficult to achieve with current commodity computers. The computers may yield secrets through physical breach, software bug exploitation, or ...
- ArticleAugust 2001
Kerberized credential translation: a solution to web access control
Kerberos, a widely used network authentication mechanism, is integrated into numerous applications: UNIX and Windows 2000 login, AFS, Telnet, and SSH to name a few. Yet, Web applications rely on SSL to estabilish authenticated and secure connections. ...
- ArticleAugust 2001
Capability file names: separating authorisation from user management in an internet file system
The ability to access and share information over the Internet has introduced the need for new flexible, dynamic and fine-grained access control mechanisms. None of the current mechanisms for sharing information - distributed file systems and the web - ...
- ArticleAugust 2001
Detecting format string vulnerabilities with type qualifiers
We present a new system for automatically detecting format string security vulnerabilities in C programs using a constraint-based type-inference engine. We describe new techniques for presenting the results of such an analysis to the user in a form that ...
- ArticleAugust 2001
FormatGuard: automatic protection from printf format string vulnerabilities
In June 2000, a major new class of vulnerabilities called "format bugs" was discovered when an vulnerability in WU-FTP appeared that acted almost like a buffer overflow, but wasn't. Since then, dozens of format string vulnerabilities have appeared. This ...
- ArticleAugust 2001
Statically detecting likely buffer overflow vulnerabilities
The abstract has been removed at the request of one of the authors.
- ArticleAugust 2001
RaceGuard: kernel protection from temporary file race vulnerabilities
Temporary file race vulnerabilities occur when privileged programs attempt to create temporary files in an unsafe manner. "Unsafe" means "non-atomic with respect to an attacker's activities." There is no portable standard for safely (atomically) ...
- ArticleAugust 2001
Secure data deletion for Linux file systems
Security conscious users of file systems require that deleted information and its associated meta-data are no longer accessible on the underlying physical disk. Existing file system implementations only reset the file system data structures to reflect ...
- ArticleAugust 2001
StackGhost: Hardware facilitated stack protection
Conventional Security have relied on overwriting the saved return pointer on the stack to hijack the path of execution. Under Sun Microsystem's Sparc processor architecture, we were able to implement a kernel modification to transparently and ...