Rethinking Memory Permissions for Protection Against Cross-Layer Attacks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks

As a rapidly growing cyber-physical platform, unmanned aerial vehicles are facing more security threats as their capabilities and applications continue to expand. Adversaries with detailed knowledge about the vehicle could orchestrate sophisticated attacks that are not easily detected or handled by the vehicle’s control system. In this work, we purpose a generic security framework, termed BlueB...

متن کامل

Protection Mechanisms Against Phishing Attacks

Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probability of a scammer being successful without changing the existing PIN/TAN-method on the other hand. We present a new approach, based on challenge-response-authentication. Since our proposal does not require any new hardware on the...

متن کامل

Protection against Pharming and Phishing Attacks

The intention of this whitepaper is to provide a general view of phishing and pharming as electronic fraud techniques and to show how Easy Solutions, an innovative IT security company, approaches this problem providing a solution oriented to end-users who want to access transactional and conndential websites safely SUMMARY

متن کامل

Two layer defending mechanism against DDOS attacks

Distributed Denial of Service (DDoS) attackers make a service unavailable for intended users. Attackers use IP spoofing as a weapon to disguise their identity. The spoofed traffic follows the same principles as normal traffic, so detection and filtering is very essential. Hop Count Filtering (HCF) scheme identifies packet whose source IP address is spoofed. The information about a source IP add...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Architecture and Code Optimization

سال: 2016

ISSN: 1544-3566,1544-3973

DOI: 10.1145/2842621