Filters








21 Hits in 1.5 sec

Secure Messaging Implementation in OpenSC

Maurizio Talamo, Maulahikmah Galinium, Christian H. Schunck, Franco Arcieri
<span title="">2012</span> <i title="Scientific Research Publishing, Inc,"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fwygz7e3z5d5rdz63lntpjwy6y" style="color: black;">Journal of Information Security</a> </i> &nbsp;
By implementing a secure messaging function in OpenSC 0.12.0 that protects the PIN and data exchange between the SC and the middleware, we address one important security weakness.  ...  The open-source project OpenSC provides such utilities and libraries. Here we identify some security lacks of OpenSC used as such a middleware.  ...  Figure 4 . 4 Secure messaging hook into OpenSC. Figure 5 .Figure 6 . 56 Structure of the objects in the SM operation.Copyright © 2012 SciRes.JIS Secure messaging implementation in OpenSC.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/jis.2012.34032">doi:10.4236/jis.2012.34032</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zagw27yvwnbbjoj3qgfzq3zlby">fatcat:zagw27yvwnbbjoj3qgfzq3zlby</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20140723155144/http://www.scirp.org/journal/PaperDownload.aspx?paperID=23945" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f3/c0/f3c0dd4dcacb19db5c8baef04dd0e5b39e0c1eb2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/jis.2012.34032"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Implementation Software to Secure Virtual Machines with Remote Grid of Secure Elements

Hassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle
<span title="">2014</span> <i title="IEEE"> 2014 IEEE Military Communications Conference </i> &nbsp;
In this implementation, only authorized users are allowed to create or instantiate virtual environments.  ...  The goal of this paper is to describe the implementation and the experimentation of the solution for identifying users and nodes in the SecFuNet architecture.  ...  This section indicates the main functions that are implemented in the Secure Middleware Library.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/milcom.2014.51">doi:10.1109/milcom.2014.51</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bh4wakv3xfeqbc6q6dyhlkma64">fatcat:bh4wakv3xfeqbc6q6dyhlkma64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170929060429/https://hal.archives-ouvertes.fr/hal-01092983/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8a/1d/8a1dc9028ba4563cc366cd2d262a90be3258b381.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/milcom.2014.51"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Security architecture for law enforcement agencies

Manuel Urueña, Petr Machník, Marcin Niemiec, Nikolai Stoianov
<span title="2014-11-29">2014</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7inqmh346zfjjizjyieh7ijtma" style="color: black;">Multimedia tools and applications</a> </i> &nbsp;
in smart cards.  ...  be implemented first.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution License which permits any use, distribution, and reproduction in any medium, provided the original author(s)  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11042-014-2386-3">doi:10.1007/s11042-014-2386-3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tqidpe6inbah3dnthivcmmqn7i">fatcat:tqidpe6inbah3dnthivcmmqn7i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171012000518/http://publisher-connector.core.ac.uk/resourcesync/data/Springer-OA/pdf/454/aHR0cDovL2xpbmsuc3ByaW5nZXIuY29tLzEwLjEwMDcvczExMDQyLTAxNC0yMzg2LTMucGRm.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d7/51/d7514fe2b40043de6e3f0b6fb82ceb55bca755e5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11042-014-2386-3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Mobile Smart Card Reader Using NFC-Enabled Smartphones [chapter]

Frank Morgner, Dominik Oepen, Wolf Müller, Jens-Peter Redlich
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jajl7qtqc5cy7oavratsldrv2y" style="color: black;">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</a> </i> &nbsp;
In this paper, we discuss the concept and implementation details of the mobile reader and present a use case for the German electronic identity card.  ...  This mobile smart card reader implementation enables ubiquitous, secure and convenient two-factor authentication, the mobile phone being a very personal device which users guard carefully and with which  ...  The SP reads the data from the nPA using Secure Messaging (SM). 1 A complete overview is given in BSI TR-03127 [3] . 2 Cryptographic protocols to access the nPA (e.g.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-33392-7_3">doi:10.1007/978-3-642-33392-7_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/puh2rooghvcahhqnok4tecstpa">fatcat:puh2rooghvcahhqnok4tecstpa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120714050821/http://sar.informatik.hu-berlin.de/research/publications/SAR-PR-2012-07/SAR-PR-2012-07_.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4c/80/4c8027da663b116b4222cc96825aa1d11ce0776d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-33392-7_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Certified Side Channels [article]

Cesar Pereida García, Sohaib ul Hassan, Nicola Tuveri, Iaroslav Gridin, Alejandro Cabrera Aldaya, Billy Bob Brumley
<span title="2020-04-01">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We demonstrate that the format in which private keys are persisted impacts Side Channel Analysis (SCA) security.  ...  Exploiting these vulnerabilities, we design and implement key recovery attacks utilizing signals ranging from electromagnetic (EM) emanations, to granular microarchitecture cache timings, to coarse traditional  ...  In fact, OpenSC has a function 7 that creates a key container-by call-6 https://github.com/OpenSC/OpenSC 7 https://github.com/OpenSC/OpenSC/blob/master/src/ minidriver/minidriver.c#L3308 L1 dcache trace  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1909.01785v2">arXiv:1909.01785v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3j2dpdg2k5b3ze5cgyzoq2yzii">fatcat:3j2dpdg2k5b3ze5cgyzoq2yzii</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200403001145/https://arxiv.org/pdf/1909.01785v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1909.01785v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Linux Implementation and Evaluation of a Cooperation Mechanism for Hybrid Wireless Networks

Attila Weyland, Torsten Braun, Thomas Staub, Carolin Latze
<span title="">2006</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/umhtnodvujeidepubvtsptnyci" style="color: black;">Local Computer Networks (LCN), Proceedings of the IEEE Conference on</a> </i> &nbsp;
We identify the limitations of our scheme in a real-life scenario and discuss possible improvements. For an in-depth description on the CASHnet operation and security mechanisms, we refer to [22] .  ...  We present the Linux implementation of our previously proposed cooperation and accounting strategy for hybrid wireless networks called CASHnet.  ...  OpenSC [1] provides the API for our program.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/lcn.2006.322203">doi:10.1109/lcn.2006.322203</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/lcn/WeylandBSL06.html">dblp:conf/lcn/WeylandBSL06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6iyhjjt5pzdnhauwexsq3op7sy">fatcat:6iyhjjt5pzdnhauwexsq3op7sy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321052103/http://home.inf.unibe.ch/~rvs/research/pub_files/WLBS06.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/5a/e25ab9d1ac1939e9c2acb1b13bc0a23633002950.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/lcn.2006.322203"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE

Patrícia R. Sousa, Luís Magalhães, João S. Resende, Rolando Martins, Luís Antunes
<span title="2021-09-02">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets.  ...  Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems.  ...  Security Analysis In this section, we define a security analysis composed of two main components: a threat model that help other researchers to understand the threats associated with out implementations  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s21175898">doi:10.3390/s21175898</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/34502789">pmid:34502789</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3g6rft43ljdnzdbj52iha2iez4">fatcat:3g6rft43ljdnzdbj52iha2iez4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210905084055/https://mdpi-res.com/d_attachment/sensors/sensors-21-05898/article_deploy/sensors-21-05898.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/49/ef/49ef4672b13c1aa62235516a398a7b996c552bf3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s21175898"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Improved Security Notions and Protocols for Non-transferable Identification [chapter]

Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadeghi, Ivan Visconti
<span title="">2008</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Different security notions and settings for identification protocols have been proposed so far, considering different powerful adversaries that can play "man-in-the-middle" attacks.  ...  In this paper we consider one of the strongest forms of these attacks, namely resettably non-transferable identification introduced in [Bellare et al., Eurocrypt 2001].  ...  The extractor E then goes back to the opening phase and instead of openingĉ to c, it opensĉ to a randomly chosen message c . Here we have that the probability that c = c is negligible in k.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-88313-5_24">doi:10.1007/978-3-540-88313-5_24</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/frpt62ygybaajlzydeso63dbdm">fatcat:frpt62ygybaajlzydeso63dbdm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321120246/http://libeccio.di.unisa.it/Papers/EPass/esorics-cameraready.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f4/1e/f41e25aa0161dd04caf37e4c61c1ea81631ad501.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-88313-5_24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules [chapter]

Jean Everson Martina, Tulio Cicero Salvaro de Souza, Ricardo Felipe Custodio
<span title="">2007</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI.  ...  Other important issue is that HSMs are targeted in their development to the Bank industry and not to PKI, making some important PKI issues, like, strict key usage control and a secure auditing trail, play  ...  The protocol was coded and embedded in a prototype HSM. The implementation has shown that it is comfortable and secure to manage private keys to Certification Authorities.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-73408-6_16">doi:10.1007/978-3-540-73408-6_16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tb5k4o2rnjgljenfeijpw4verq">fatcat:tb5k4o2rnjgljenfeijpw4verq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808060340/https://projetos.inf.ufsc.br/arquivos_projetos/projeto_897/martina_souza_custodio_europki.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/57/e2/57e2a179c15fa8fd62d6f6c7cb45186c5838d372.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-73408-6_16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

In Certificates We Trust -- Revisited

Florian Reimair, Peter Teufl, Bernd Prunster
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yaqmt4o5gzav5ivi6pnbkjqdui" style="color: black;">2015 IEEE Trustcom/BigDataSE/ISPA</a> </i> &nbsp;
We show the results of our prototypical implementation and present a discussion on the security of the system.  ...  Naturally, it is crucial for data security to pick the correct keys with suf¿cient security levels.  ...  We give a security discussion in section V and conclude the work in section VI. II.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/trustcom.2015.437">doi:10.1109/trustcom.2015.437</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/trustcom/ReimairTP15.html">dblp:conf/trustcom/ReimairTP15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pipilw6zrbepvi2rhsmbildx7u">fatcat:pipilw6zrbepvi2rhsmbildx7u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200320193946/https://online.tugraz.at/tug_online/voe_main2.getvolltext?pCurrPk=85953" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/05/80/0580c8797ff7c07858432b415d0b8414b77a1455.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/trustcom.2015.437"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

An Empirical Study on Detecting and Fixing Buffer Overflow Bugs

Tao Ye, Lingming Zhang, Linzhang Wang, Xuandong Li
<span title="">2016</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2vets7bfvjgrfdnvqtw7wrhqk4" style="color: black;">2016 IEEE International Conference on Software Testing, Verification and Validation (ICST)</a> </i> &nbsp;
Buffer overflow is one of the most common types of software security vulnerabilities.  ...  In this paper, we perform an in-depth quantitative and qualitative study on static buffer overflow detection.  ...  We thank all the students who helped us in the experiment.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icst.2016.21">doi:10.1109/icst.2016.21</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icst/YeZWL16.html">dblp:conf/icst/YeZWL16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6d7x7n4jh5hddkxoot3ru6sqba">fatcat:6d7x7n4jh5hddkxoot3ru6sqba</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170421124335/http://www.utdallas.edu:80/~lxz144130/publications/icst2016.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/20/e8/20e86f51f90b1fa9ae48752f73a757d1272ca26a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icst.2016.21"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Public-Key Infrastructure [chapter]

<span title="2013-03-25">2013</span> <i title="John Wiley &amp; Sons, Ltd"> Wireless Mobile Internet Security </i> &nbsp;
Nevertheless, constructing effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services remains both a technological and  ...  in June 2008.  ...  This work was in part funded by Landesstiftung Baden-Württemberg in the scope of the Spontaneous Virtual Networks (SpoVNet) project. Acknowledgments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9781118512920.ch7">doi:10.1002/9781118512920.ch7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hocfzfhi4rbuhmssop2hkwbc64">fatcat:hocfzfhi4rbuhmssop2hkwbc64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160919180742/http://orbilu.uni.lu/bitstream/10993/25909/1/bok%253A978-3-540-69485-4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5d/3d/5d3dc8a9addb140613cea039906ebe2fb17f8f57.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/9781118512920.ch7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

Combining Graph-based Learning with Automated Data Collection for Code Vulnerability Detection

Huanting Wang, Guixin Ye, Zhanyong Tang, Shin Hwei Tan, Songfang Huang, Dingyi Fang, Yansong Feng, Lizhong Bian, Zheng Wang
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xqa4uhvxwvgsbdpllabnuanz6e" style="color: black;">IEEE Transactions on Information Forensics and Security</a> </i> &nbsp;
This provides many real-life vulnerable code training samples to complement the limited vulnerable code samples available in standard vulnerability databases.  ...  FUNDED leverages the advances in graph neural networks (GNNs) to develop a novel graph-based learning method to capture and reason about the program's control, data, and call dependencies.  ...  Implementation We implement GNN-based vulnerability detection model using Tensorflow v.1.8 [46] and models for data collection using the Python scikit-learn package [47] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tifs.2020.3044773">doi:10.1109/tifs.2020.3044773</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2bmr7ndhbff6rn4swj5kupzosm">fatcat:2bmr7ndhbff6rn4swj5kupzosm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210428143807/https://eprints.whiterose.ac.uk/168594/16/TIFS_2021.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0d/1a/0d1a6e42291fac8082036bfc3c73c7512d97b512.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tifs.2020.3044773"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Automatically Generating Test Cases for Specification Mining

Valentin Dallmeier, Nikolai Knopp, Christoph Mallon, Gordon Fraser, Sebastian Hack, Andreas Zeller
<span title="">2012</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dthyqga2onff5nwf4agwqtrhxi" style="color: black;">IEEE Transactions on Software Engineering</a> </i> &nbsp;
We thank the anonymous reviewers for their help in improving the final version of this paper. Klaas Boesche provided lots of support implementing JFTA.  ...  To test the two SMTP implementations we ran a simple SMTP server 5 which gives valid responses but does not deliver messages, and modified the classes under test to always connect to this server.  ...  We have therefore implemented our own typestate verifier called JFTA.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tse.2011.105">doi:10.1109/tse.2011.105</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pf3blwo765gubfofjye6hvvbzi">fatcat:pf3blwo765gubfofjye6hvvbzi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321090725/https://www.st.cs.uni-saarland.de/publications/files/dallmeier-tse-2011.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/66/be/66bea663cb7534c4c03d2d8a1606876eb443187d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tse.2011.105"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Characterizing Activity on the Deep and Dark Web [article]

Nazgol Tavabi, Nathan Bartley, Andrés Abeliuk, Sandeep Soni, Emilio Ferrara, Kristina Lerman
<span title="2019-03-01">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this paper, we study a large corpus of messages posted to 80 d2web forums over a period of more than a year.  ...  We show that our approach surfaces hidden similarities across different forums and can help identify anomalous events in this rich, heterogeneous data.  ...  In this model each document In this paper we use the Gensim implementation of LDA [23] to learn a model with 100 topics.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1903.00156v1">arXiv:1903.00156v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/i77i55drunhohn5t3mqxby3mzy">fatcat:i77i55drunhohn5t3mqxby3mzy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191017162431/https://arxiv.org/pdf/1903.00156v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/04/01/040163b89546b9eeb3560312e17587a813738781.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1903.00156v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 21 results