• Login
    Search 
    •   MINDS@UW Home
    • MINDS@UW Madison
    • College of Letters and Science, University of Wisconsin–Madison
    • Department of Computer Sciences, UW-Madison
    • CS Technical Reports
    • Search
    •   MINDS@UW Home
    • MINDS@UW Madison
    • College of Letters and Science, University of Wisconsin–Madison
    • Department of Computer Sciences, UW-Madison
    • CS Technical Reports
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 19

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Attack Generation for NIDS Testing Using Natural Deduction 

    Rubin, Shai; Jha, Somesh; Miller, Barton P. (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it fails to recognize. For example, to avoid matching between the attack payload and the ...
    Thumbnail

    Retrofitting Legacy Code for Authorization Policy Enforcement 

    Ganapathy, Vinod; Jaeger, Trent; Jha, Somesh (University of Wisconsin-Madison Department of Computer Sciences, 2005)
    Researchers have long argued that the best way to construct a secure system is to proactively integrate security into the design of the system. However, this tenet is rarely followed because of economic and practical ...
    Thumbnail

    On Effective Model-Based Intrusion Detection 

    Giffin, Jonathon; Jha, Somesh; Miller, Barton P. (University of Wisconsin-Madison Department of Computer Sciences, 2005)
    Model-based intrusion detectors restrict program execution to a previously computed model of expected behavior. We consider two classes of attacks against these systems: bypass attacks that evade detection by avoiding the ...
    Thumbnail

    Formalizing Attack Mutation for NIDS Testing 

    Rubin, Shai; Jha, Somesh; Miller, Barton P. (University of Wisconsin-Madison Department of Computer Sciences, 2005)
    Attack mutation is a common way to test a misuse Network Intrusion Detection System (NIDS). In this technique, a known instance of an attack is transformed by repeatedly applying attack transformations into many distinct ...
    Thumbnail

    Malware Normalization 

    Christodorescu, Mihai; Kinder, Johannes; Jha, Somesh; Katzenbeisser, Stefan; Veith, Helmut (University of Wisconsin-Madison Department of Computer Sciences, 2005)
    Malware is code designed for a malicious purpose, such as obtaining root privilege on a host. A malware detector identifies malware and thus prevents it from adversely affecting a host. In order to evade detection by ...
    Thumbnail

    Buffer Overrun Detection Using Linear Programming and Static Analysis 

    Ganapathy, Vinod; Jha, Somesh; Chandler, David; Melski, David; Vitek, David (University of Wisconsin-Madison Department of Computer Sciences, 2003)
    This paper addresses the issue of identifiing buffer overrun vulnerabilities by statically analyzing C source code. We demonstrate a scalable analysis based on modeling C string manipulations as a linear program. We also ...
    Thumbnail

    Security Policy Reconciliation in Distributed Computing Environments 

    Wang, Hao; Jha, Somesh; Livny, Miron; McDaniel, Patrick (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    A major hurdle in sharing resources between organizations is heterogeneity. Therefore, in order for two organizations to collaborate their policies have to be resolved. The process of resolving different policies is known ...
    Thumbnail

    Towards Discovering and Containing Privacy Violations in Software 

    Kruger, Louis; Wang, Hao; Jha, Somesh (University of Wisconsin-Madison Department of Computer Sciences, 2004)
    Malicious code can wreak havoc on our cyberinfrastructure. Hence, discovering and containing malicious code is an important goal. This paper focuses on privacy-violating malicious code. Examples of privacy violations ...
    Thumbnail

    Reducing the Dependence of Trust-Management Systems on PKI 

    Wang, Hao; Jha, Somesh; Reps, Thomas; Schwoon, Stefan; Stubblebine, Stuart (University of Wisconsin-Madison Department of Computer Sciences, 2005)
    Trust-management systems address the authorization problem in distributed systems by defining a formal language for expressing authorization and access-control policies, and relying on an algorithm to determine when a ...
    Thumbnail

    Distributed Certificate-Chain Discovery in SPKI/SDSI 

    Schwoon, Stefan; Wang, Hao; Jha, Somesh; Reps, Thomas (University of Wisconsin-Madison Department of Computer Sciences, 2005)
    The authorization problem is to decide whether, according to a security policy, some principal should be allowed access to a resource. In the trust-management system SPKI/SDSI, the security policy is given by a set of ...
    • 1
    • 2

    Contact Us | Send Feedback
     

     

    Browse

    All of MINDS@UWCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    Discover

    Author
    Jha, Somesh (19)
    Reps, Thomas (5)Ganapathy, Vinod (4)Schwoon, Stefan (4)Wang, Hao (4)Miller, Barton P. (3)Barford, Paul (2)Christodorescu, Mihai (2)Giffin, Jonathon (2)Jaeger, Trent (2)... View MoreDate Issued2005 (6)2003 (5)2004 (5)2006 (2)2009 (1)Has File(s)Yes (19)

    Contact Us | Send Feedback