Rethinking Memory Permissions for Protection Against Cross-Layer Attacks
نویسندگان
چکیده
منابع مشابه
Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks
As a rapidly growing cyber-physical platform, unmanned aerial vehicles are facing more security threats as their capabilities and applications continue to expand. Adversaries with detailed knowledge about the vehicle could orchestrate sophisticated attacks that are not easily detected or handled by the vehicle’s control system. In this work, we purpose a generic security framework, termed BlueB...
متن کاملProtection Mechanisms Against Phishing Attacks
Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probability of a scammer being successful without changing the existing PIN/TAN-method on the other hand. We present a new approach, based on challenge-response-authentication. Since our proposal does not require any new hardware on the...
متن کاملProtection against Pharming and Phishing Attacks
The intention of this whitepaper is to provide a general view of phishing and pharming as electronic fraud techniques and to show how Easy Solutions, an innovative IT security company, approaches this problem providing a solution oriented to end-users who want to access transactional and conndential websites safely SUMMARY
متن کاملTwo layer defending mechanism against DDOS attacks
Distributed Denial of Service (DDoS) attackers make a service unavailable for intended users. Attackers use IP spoofing as a weapon to disguise their identity. The spoofed traffic follows the same principles as normal traffic, so detection and filtering is very essential. Hop Count Filtering (HCF) scheme identifies packet whose source IP address is spoofed. The information about a source IP add...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Architecture and Code Optimization
سال: 2016
ISSN: 1544-3566,1544-3973
DOI: 10.1145/2842621