Computers under Attacks!

نویسندگان

  • Anne Bonfante
  • Jean-Yves Marion
چکیده

The war metaphor seems to establish itself as soon as we deal with computer viruses. The concept of war is a central topic of political philosophy. The relationships between " hackers " and " crackers " and information technology world are based on power relations, whose issues are politic, economic and epistemological. We wonder whether the computer disease phenomenon is a modern representation of the war and the relationships of power, as it is suggested in Foucault from Les Mots et Les Choses. So, it is legitimate to compare the aspects of this war with the classical analyses of war, which in the literature are founded by the classical Greco-Roman philosophers, or the modern ones such as Machiavelli or Clausewitz.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Minimization of Security Alerts under Denial of Service Attacks in Grid Computing Networks

Grid computing networks aggregate huge computing power that they need for solving different scientific problems. This power can be used for attacking the grid’s components as well as outside computers. Attacks such as the Denial of Service (DoS) could be used to target user machines, servers, and security management solutions to sabotage the normal operations of the grid computing network. In t...

متن کامل

Side channel parameter characteristics of code injection attacks

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

متن کامل

Examining Smart-Card Security under the Threat of Power Analysis Attacks

ÐThis paper examines how monitoring power consumption signals might breach smart-card security. Both simple power analysis and differential power analysis attacks are investigated. The theory behind these attacks is reviewed. Then, we concentrate on showing how power analysis theory can be applied to attack an actual smart card. We examine the noise characteristics of the power signals and deve...

متن کامل

Security Analysis of AES Using Functionality Fault Model

Security of cryptographic circuits is a major concern. Smartcards are targeted by sophisticated attacks like fault attacks that combine physical disturbance and cryptanalysis. We propose a methodology and a tool (PAFI) to analyse the robustness of circuits under fault attacks using fault injection in simulation. The number of injection is reduced by taking into account the function of the latch...

متن کامل

On Widening the Scope of Attack Recognition Languages

The Intrusion Detection (ID) community has developed numerous proposals for languages with which to describe signatures of attacks on computers and networks. By and large, these languages provide means for describing sequences of specific events indicative of attacks through their presence or absence in the history of some computational system. This note argues from examples that meeting the ne...

متن کامل

Sustaining Availability of Web Services under Distributed Denial of Service Attacks

The recent tide of Distributed Denial of Service (DDoS) attacks against high-profile web sites demonstrate how devastating DDoS attacks are and how defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect the availability of web services during severe DDoS attacks. The basic idea behind our system is to isolate and protect legitimate traffic fro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006