Universidade de Lisboa

Displaying 1-6 of 6 results

  • White Papers // Feb 2012

    Indexed Types in Object-Oriented Programming

    Dependent type systems allow semantic properties to be expressed in types that carry important information about program values. The type systems in mainstream languages such as Java are effective but have a limited expressive power. The authors propose to extend a simple Java-like language with indexed types, a form of...

    Provided By Universidade de Lisboa

  • White Papers // Jan 2012

    Using Attack Injection to Discover New Vulnerabilities

    Due to the people increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the paper describes a new tool for the discovery of security vulnerabilities on network connected servers. The AJECT tool uses a specification of...

    Provided By Universidade de Lisboa

  • White Papers // Sep 2011

    Reverse Engineering of Protocols From Network Traces

    Communication protocols determine how network components interact with each other. Therefore, the ability to derive a specification of a protocol can be useful in various contexts, such as to support deeper black-box testing or effective defense mechanisms. Unfortunately, it is often hard to obtain the specification because systems implement closed...

    Provided By Universidade de Lisboa

  • White Papers // May 2011

    Diverse OS Rejuvenation for Intrusion Tolerance

    Proactive recovery is technique that periodically rejuvenates the components of a replicated system. When used in the context of intrusion-tolerant systems, in which faulty replicas may be under control of some adversary, it allows the removal of intrusions from the compromised replicas. However, since the set of vulnerabilities remains the...

    Provided By Universidade de Lisboa

  • White Papers // Apr 2010

    Using Attack Injection on Closed Protocols

    Many network servers rely on the correctness and security of closed protocols. However, the unavailability of the protocol specification hinders any attempt to adequately test the implementations of that protocol. The paper addresses this problem by complementing an attack injection methodology with a protocol reverse engineering component. The authors introduce...

    Provided By Universidade de Lisboa

  • White Papers // Apr 2010

    Randomized Consensus in Wireless Environments: A Case Where More Is Better

    In many emerging wireless scenarios, consensus among nodes represents an important task that must be accomplished in a timely and dependable manner. However, the sharing of the radio medium and the typical communication failures of such environments may seriously hinder this operation. In the paper, the authors perform a practical...

    Provided By Universidade de Lisboa

  • White Papers // Feb 2012

    Indexed Types in Object-Oriented Programming

    Dependent type systems allow semantic properties to be expressed in types that carry important information about program values. The type systems in mainstream languages such as Java are effective but have a limited expressive power. The authors propose to extend a simple Java-like language with indexed types, a form of...

    Provided By Universidade de Lisboa

  • White Papers // Sep 2011

    Reverse Engineering of Protocols From Network Traces

    Communication protocols determine how network components interact with each other. Therefore, the ability to derive a specification of a protocol can be useful in various contexts, such as to support deeper black-box testing or effective defense mechanisms. Unfortunately, it is often hard to obtain the specification because systems implement closed...

    Provided By Universidade de Lisboa

  • White Papers // Apr 2010

    Randomized Consensus in Wireless Environments: A Case Where More Is Better

    In many emerging wireless scenarios, consensus among nodes represents an important task that must be accomplished in a timely and dependable manner. However, the sharing of the radio medium and the typical communication failures of such environments may seriously hinder this operation. In the paper, the authors perform a practical...

    Provided By Universidade de Lisboa

  • White Papers // Jan 2012

    Using Attack Injection to Discover New Vulnerabilities

    Due to the people increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the paper describes a new tool for the discovery of security vulnerabilities on network connected servers. The AJECT tool uses a specification of...

    Provided By Universidade de Lisboa

  • White Papers // Apr 2010

    Using Attack Injection on Closed Protocols

    Many network servers rely on the correctness and security of closed protocols. However, the unavailability of the protocol specification hinders any attempt to adequately test the implementations of that protocol. The paper addresses this problem by complementing an attack injection methodology with a protocol reverse engineering component. The authors introduce...

    Provided By Universidade de Lisboa

  • White Papers // May 2011

    Diverse OS Rejuvenation for Intrusion Tolerance

    Proactive recovery is technique that periodically rejuvenates the components of a replicated system. When used in the context of intrusion-tolerant systems, in which faulty replicas may be under control of some adversary, it allows the removal of intrusions from the compromised replicas. However, since the set of vulnerabilities remains the...

    Provided By Universidade de Lisboa