Civitas: Toward a secure voting system

MR Clarkson, S Chong… - 2008 IEEE Symposium on …, 2008 - ieeexplore.ieee.org
Civitas is the first electronic voting system that is coercion-resistant, universally and voter
verifiable, and suitable for remote voting. This paper describes the design and …

[图书][B] Immunological computation: theory and applications

D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …

Casting out demons: Sanitizing training data for anomaly sensors

GF Cretu, A Stavrou, ME Locasto… - … IEEE Symposium on …, 2008 - ieeexplore.ieee.org
The efficacy of anomaly detection (AD) sensors depends heavily on the quality of the data
used to train them. Artificial or contrived training data may not provide a realistic view of the …

Data space randomization

S Bhatkar, R Sekar - International Conference on Detection of Intrusions …, 2008 - Springer
Over the past several years, US-CERT advisories, as well as most critical updates from
software vendors, have been due to memory corruption vulnerabilities such as buffer …

[PDF][PDF] Data randomization

C Cadar, P Akritidis, M Costa, JP Martin, M Castro - 2008 - doc.ic.ac.uk
Attacks that exploit memory errors are still a serious problem. We present data
randomization, a new technique that provides probabilistic protection against these attacks …

Security through redundant data diversity

A Nguyen-Tuong, D Evans, JC Knight… - … and Networks With …, 2008 - ieeexplore.ieee.org
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring
secrets. Instead, they use redundancy (to require an attacker to simultaneously compromise …

Diverse Replication for {Single-Machine}{Byzantine-Fault} Tolerance

BG Chun, P Maniatis, S Shenker - 2008 USENIX Annual Technical …, 2008 - usenix.org
New single-machine environments are emerging from abundant computation available
through multiple cores and secure virtualization. In this paper, we describe the research …

Improving sensor network immunity under worm attacks: a software diversity approach

Y Yang, S Zhu, G Cao - Proceedings of the 9th ACM international …, 2008 - dl.acm.org
Because of cost and resource constraints, sensor nodes do not have a complicated
hardware architecture or operating system to protect program safety. Hence, the notorious …

[PDF][PDF] Reverse stack execution in a multi-variant execution environment

B Salamat, A Gal, M Franz - Workshop on Compiler and Architectural …, 2008 - babaks.com
Multi-variant execution allows detecting exploited vulnerabilities before they can cause any
damage to systems. In this execution method, two or more slightly different variants of the …

Vigilante: End-to-end containment of internet worm epidemics

M Costa, J Crowcroft, M Castro, A Rowstron… - ACM Transactions on …, 2008 - dl.acm.org
Worm containment must be automatic because worms can spread too fast for humans to
respond. Recent work proposed network-level techniques to automate worm containment; …