نتایج جستجو برای: primary user emulation attack
تعداد نتایج: 950393 فیلتر نتایج به سال:
In this paper we present the Wireless LAN (WLAN) emulator that we design to run on StarBED, the large scale network experiment environment of the Hokuriku Research Centre in Ishikawa, Japan. As WLANs start to spread on an ever wider scale, the need to investigate application deployment on WLANs has become stringent. We develop an emulation environment since it allows using in experiments the re...
Emulation is one of the main strategies for preserving digital objects. With different emulation environments to choose from when preserving a collection of digital objects it is necessary to choose the emulator that is able to render the significant properties of an object best. But also on the development side it is necessary to run automated tests for new versions of emulators. In this work ...
Emulation based ATE is an appropriate technique to use when testing complex / microprocessor based boards containing one or more microprocessors, microprocessor-emulation-based ATE is an appropriate technique to be considered for testing. By using microprocessor emulation, the unit under test can be stimulated and controlled from its microprocessor buses. This technique often can complement oth...
The Mach 3.0 multi-server system decomposes the functionality of the operating system between a micro-kernel, a set of system servers running in user-mode and an emulation library executing in the address space of applications. The interfaces provided by the system servers are objectoriented and both the servers and the emulation library are written in an object-oriented language. In this paper...
Near Field Communication’s card emulation mode is a way to combine smartcards with a mobile phone. Relay attack scenarios are well-known for contactless smartcards. In the past, relay attacks have only been considered for the case, where an attacker has physical proximity to an NFC-enabled mobile phone. However, a mobile phone introduces a significantly di↵erent threat vector. A mobile phone’s ...
As state-of-the-art attack detection technology becomes more prevalent, attackers have started to employ evasion techniques such as code obfuscation and polymorphism to defeat existing defenses. We have recently proposed network-level emulation, a heuristic detection method that scans network traffic to detect polymorphic attacks. Our approach uses a CPU emulator to dynamically analyze every po...
The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return the same answer to any given query regardless of who may have issued the query, and thus all data in the DNS is assumed to be public. Such an assumption potentially conflicts with the privacy policies of private Internet hosts, p...
Growing design complexity has made functional debugging of application-specific integrated circuits crucial to their development. Two widely used debugging techniques are simulation and emulation. Design simulation provides good controllability and observability of the variables in a design, but is two to ten orders of magnitude slower than the fabricated design. Design emulation and fabricatio...
Client emulation tools play a central role in the performance evaluation, capacity planning, and workload characterization of servers. However, traditional emulation tools, because of their limited scalability and extensibility, fail to keep up with servers as they increase in complexity and performance. In this paper, we propose Eve, a scalable client emulation tool that is capable of stress-t...
In this paper, a novel approach for wireless network emulation is proposed. The emulation infrastructure is built on a virtualized Linux kernel (User Mode Linux) which allows for highly realistic emulations. The virtualized kernel is extended with software based wireless cards which are plugged in a generic physical layer emulator. The emulator proposed in this paper tries to reduce the gap bet...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید