HACKER ATTACKS UNDETECTABLE ATTACKS FROM TROJANS WITH REVERSE COMMUNICATION
نویسندگان
چکیده
منابع مشابه
Undetectable On{line Password Guessing Attacks Undetectable On-line Password Guessing Attacks
Limited distribution notes: This report has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher its distribution outside the University of Technology Chemnitz-Zwickau prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by rep...
متن کاملAttacks on JavaScript Mashup Communication
In a mashup, two principals wish to communicate without ceding complete control to each other. In this paper, we analyze whether existing and proposed JavaScript mashup communication mechanisms have this security property. We show that a failure to account for details of JavaScript often lets one communicant completely compromise the other. We illustrate these vulnerabilities with proof-of-conc...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملProtecting communication infrastructures against attacks with programmable networking technology
The continued explosion of new virus/worm and other security attacks in the Internet, the tremendous propagation speed of self-propagating attacks, and the still increasing number of hosts connected to the Internet has led to network security being considered as a design criterion rather than an afterthought. Beyond this, also the diversity of software is increasing and still the quality of man...
متن کاملA Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks
Over the last decade, hardware Trojans have gained increasing attention in academia, industry and by government agencies. In order to design reliable countermeasures, it is crucial to understand how hardware Trojans can be built in practice. This is an area that has received relatively scant treatment in the literature. In this contribution, we examine how particularly stealthy Trojans can be i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Математички билтен/BULLETIN MATHÉMATIQUE DE LA SOCIÉTÉ DES MATHÉMATICIENS DE LA RÉPUBLIQUE MACÉDOINE
سال: 2015
ISSN: 0351-336X,1857-9914
DOI: 10.37560/matbil15100065p