Defacement Detection with Passive Adversaries
نویسندگان
چکیده
منابع مشابه
Implementation of Web Defacement Detection Technique
Websites are no longer merely about having an “Internet presence” today, but are also used for commercial transactions and to transfer sensitive data like personal information, credit card number, etc. This rapid proliferation of website has also spawned new threat to business and other organizations. Hackers are developing new techniques to deface website and steal the data from Web server. On...
متن کاملComputationally Sound Implementations of Equational Theories Against Passive Adversaries
In this paper we study the link between formal and cryptographic models for security protocols in the presence of passive adversaries. In contrast to other works, we do not consider a fixed set of primitives but aim at results for arbitrary equational theories. We define a framework for comparing a cryptographic implementation and its idealization with respect to various security notions. In pa...
متن کاملSecurity of ECQV-Certified ECDSA Against Passive Adversaries
We show that the elliptic curve Qu-Vanstone implicit certificate scheme (ECQV), when composed with the Elliptic Curve Digital Signature Algorithm (ECDSA), is secure against passive adversaries under the combined assumption of the random oracle model and the generic group model. In contrast, we detail an attack on the composition of another implicit certificate scheme, proposed by Pintsov and Va...
متن کاملDetection Games Under Fully Active Adversaries
We study a binary hypothesis testing problem in which a defender must decide whether or not a test sequence has been drawn from a given memoryless source P0 whereas, an attacker strives to impede the correct detection. With respect to previous works, the adversarial setup addressed in this paper considers an attacker who is active under both hypotheses, namely, a fully active attacker, as oppos...
متن کاملError Detection Techniques Against Strong Adversaries
“Side channel” attacks (SCA) pose a serious threat on many cryptographic devices and are shown to be effective on many existing security algorithms which are in the black box model considered to be secure. These attacks are based on the key idea of recovering secret information using implementation specific side-channels. Especially active fault injection attacks are very effective in terms of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Algorithms
سال: 2019
ISSN: 1999-4893
DOI: 10.3390/a12080150