Thwarting Control-Channel Jamming Attacks from Inside Jammers

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Jamming in wireless networks with cooperative jammers

The problem of jamming plays a very important role in ensuring the quality and security of wireless communications, especially now when wireless networks are quickly becoming ubiquitous. Since jamming phenomenon can be considered as a game where a player (say, jammer) is playing against a user (transmitter), game theory is an appropriate tool for dealing with the jamming problem. In this paper ...

متن کامل

Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity

We explore software diversity as a defense against side-channel attacks by dynamically and systematically randomizing the control flow of programs. Existing software diversity techniques transform each program trace identically. Our diversity based technique instead transforms programs to make each program trace unique. This approach offers probabilistic protection against both online and off-l...

متن کامل

Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach

Cyber-physical systems rely on distributed embedded wireless nodes for sensing, computation, and control, often leaving them vulnerable to intelligent attacks. Detecting and mitigating such attacks in a resource-efficient manner requires the network to identify the components under attack and adapt its response based on the observed network performance and attack impact. In this paper, we prese...

متن کامل

Thwarting Passive Privacy Attacks in Collaborative Filtering

While recommender systems based on collaborative filtering have become an essential tool to help users access items of interest, it has been indicated that collaborative filtering enables an adversary to perform passive privacy attacks, a type of the most damaging and easy-to-perform privacy attacks. In a passive privacy attack, the dynamic nature of a recommender system allows an adversary wit...

متن کامل

Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults

To make outsourcing computing more practical, Intel recently introduced SGX, a hardware extension that creates secure enclaves for the execution of client applications. With SGX, instruction execution and data access inside an enclave are invisible to the underlying OS, thereby achieving both confidentiality and integrity for outsourced computing. However, since SGX excludes the OS from its tru...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Mobile Computing

سال: 2012

ISSN: 1536-1233

DOI: 10.1109/tmc.2011.165