• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 68
Next 10 →

Generalized vulnerability extrapolation using abstract syntax trees

by Fabian Yamaguchi, Markus Lottmann, Konrad Rieck - In Annual Computer Security Applications Conference (ACSAC , 2012
"... The discovery of vulnerabilities in source code is a key for securing computer systems. While specific types of security flaws can be identified automatically, in the general case the process of finding vulnerabilities cannot be automated and vulnerabilities are mainly discovered by manual analysis. ..."
Abstract - Cited by 9 (4 self) - Add to MetaCart
. This representation enables us to decompose a known vulnerability and extrapolate it to a code base, such that functions potentially suffering from the same flaw can be suggested to the analyst. We evaluate our method on the source code of four popular open-source projects: LibTIFF, FFmpeg, Pidgin and Asterisk

Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities using Machine Learning

by Fabian Yamaguchi, Felix ’fx Lindner, Konrad Rieck
"... Rigorous identification of vulnerabilities in program code is a key to implementing and operating secure systems. Unfortunately, only some types of vulnerabilities can be detected automatically. While techniques from software testing can accelerate the search for security flaws, in the general case ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
learning. Starting from a known vulnerability, these patterns can be exploited to guide the auditing of code and to identify potentially vulnerable code with similar characteristics—a process we refer to as vulnerability extrapolation. We empirically demonstrate the capabilities of our method in different

Decision strategies and susceptibility to phishing

by Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor - IN PROCEEDINGS OF THE SECOND SYMPOSIUM ON USABLE PRIVACY AND SECURITY , 2006
"... Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legitimate source. In order to develop tools that will be effective in combating these schemes, we first must know how and why ..."
Abstract - Cited by 99 (25 self) - Add to MetaCart
of the risks is not linked to perceived vulnerability or to useful strategies in identifying phishing emails. Rather, our data suggest that people can manage the risks that they are most familiar with, but don’t appear to extrapolate to be wary of unfamiliar risks. We explore several strategies that people use,

Estimating fishery bycatch and effects on a vulnerable seabird population.

by Rebecca L Lewison , Larry B Crowder - Ecological Applications , 2003
"... Abstract. Pelagic longline fisheries worldwide incidentally take long-lived seabird species. This mortality has led to fisheries restrictions to protect seabirds at risk, including Wandering (Diomedea exulans) and Amsterdam Albatross (D. amsterdamensis) in the South Pacific and Spectacled Petrel (P ..."
Abstract - Cited by 20 (1 self) - Add to MetaCart
and assessing the populationlevel impact on a vulnerable seabird, the Black-footed Albatross (Phoebastria nigripes) in the central North Pacific. We develop an assessment method that uses observer data to estimate bycatch for one fleet and then uses scenario analysis to estimate bycatch for remaining fleets

Analysis of Information and Communication Technology Infrastructure (ICT) Vulnerabilities in Indian Context

by M M Chaturvedi, M P Gupta, Jaijit Bhattacharya, Sun Tzu Wu
"... The paper attempts to highlight the vulnerabilities of India’s Information and Communication Technology (ICT) infrastructure to both natural and man made disasters and extrapolates its effect on national security. Using the existing organizational structures, a framework is recommended to facilitate ..."
Abstract - Add to MetaCart
The paper attempts to highlight the vulnerabilities of India’s Information and Communication Technology (ICT) infrastructure to both natural and man made disasters and extrapolates its effect on national security. Using the existing organizational structures, a framework is recommended

On the seismic vulnerability of existing buildings: A case study of the city

by Of Baselkerstin Langa, Hugo Bachmann, A M. Eeri - of Basel, Earthquake Spectra
"... In order to assess the seismic risk for Switzerland, and particularly for the city of Basel, the seismic vulnerability of the existing buildings needs to be evaluated. Since no major damaging earthquake has occurred in Switzerland in recent times, vulnerability functions from observed damage pattern ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
capacity of the buildings subjected to seismic action. Eighty-seven residential build-ings in a small target area in Basel were evaluated. The results are vulner-ability functions that express the expected damage as a function of the spec-tral displacement. In order to extrapolate the results to other

Climate Change, Agriculture, and Developing Countries

by Robert Mendelsohn, Ariel Dinar - Does Adaptation Matter?” The World Bank Research Observer , 1999
"... Because most developing countries depend heavily on agriculture, the effects of global warming on productive croplands are likely to threaten both the welfare of the population and the economic development of the countries. Tropical regions in the developing world are particularly vulnerable to pote ..."
Abstract - Cited by 57 (5 self) - Add to MetaCart
Because most developing countries depend heavily on agriculture, the effects of global warming on productive croplands are likely to threaten both the welfare of the population and the economic development of the countries. Tropical regions in the developing world are particularly vulnerable

Leveraging Semantic Signatures for Bug Search in Binary Programs

by unknown authors
"... Software vulnerabilities still constitute a high security risk and there is an ongoing race to patch known bugs. However, especially in closed-source software, there is no straight-forward way (in contrast to source code analysis) to find buggy code parts, even if the bug was publicly disclosed. To ..."
Abstract - Add to MetaCart
Software vulnerabilities still constitute a high security risk and there is an ongoing race to patch known bugs. However, especially in closed-source software, there is no straight-forward way (in contrast to source code analysis) to find buggy code parts, even if the bug was publicly disclosed

Tree regression analysis on the nesting habitat of smallmouth bass.

by Cynthia Rejwan , Nicholas C Collins , L Jerry Brunner , Brian J Shuter , Mark S Ridgway - Ecology , 1999
"... Abstract. Habitat conditions may determine locations of patchily distributed smallmouth bass nests in lakes, since young smallmouth bass are fragile and are therefore vulnerable to suboptimal physical characteristics in their typically variable nesting area, the littoral zone. Knowing which habitat ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
Abstract. Habitat conditions may determine locations of patchily distributed smallmouth bass nests in lakes, since young smallmouth bass are fragile and are therefore vulnerable to suboptimal physical characteristics in their typically variable nesting area, the littoral zone. Knowing which

Examining ACE analysis reliability estimates using fault-injection

by Nicholas J. Wang, Sanjay J. Patel - In Proceedings of the 34th Annual International Symposium on Computer Architecture , 2007
"... ACE analysis is a technique to provide an early reliability estimate for microprocessors. ACE analysis couples data from abstract performance models with low level design details to identify and rule out transient faults that will not cause incorrect execution. While many transient faults are analyz ..."
Abstract - Cited by 19 (0 self) - Add to MetaCart
vulnerability of an instruction scheduler by 2-3x. The conservatism stems from two key sources: from lack of detail in abstract performance models and from what we term Y-Bits, a result of the single-pass simulation methodology that is typical of ACE analysis. We also examine the efficacy of applying ACE
Next 10 →
Results 1 - 10 of 68
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University