نتایج جستجو برای: primary user emulation attack

تعداد نتایج: 950393  

2006
Rǎzvan Beuran Ken-ichi Chinen Khin Thida Latt Toshiyuki Miyachi Junya Nakata Lan Tien Nguyen Yoichi Shinoda Yasuo Tan Satoshi Uda Saber Zrelli

In this paper we present the Wireless LAN (WLAN) emulator that we design to run on StarBED, the large scale network experiment environment of the Hokuriku Research Centre in Ishikawa, Japan. As WLANs start to spread on an ever wider scale, the need to investigate application deployment on WLANs has become stringent. We develop an emulation environment since it allows using in experiments the re...

2009
Mark Guttenbrunner

Emulation is one of the main strategies for preserving digital objects. With different emulation environments to choose from when preserving a collection of digital objects it is necessary to choose the emulator that is able to render the significant properties of an object best. But also on the development side it is necessary to run automated tests for new versions of emulators. In this work ...

1998

Emulation based ATE is an appropriate technique to use when testing complex / microprocessor based boards containing one or more microprocessors, microprocessor-emulation-based ATE is an appropriate technique to be considered for testing. By using microprocessor emulation, the unit under test can be stimulated and controlled from its microprocessor buses. This technique often can complement oth...

1991
Paulo Guedes Daniel P. Julin

The Mach 3.0 multi-server system decomposes the functionality of the operating system between a micro-kernel, a set of system servers running in user-mode and an emulation library executing in the address space of applications. The interfaces provided by the system servers are objectoriented and both the servers and the emulation library are written in an object-oriented language. In this paper...

2012
Michael Roland Josef Langer Josef Scharinger

Near Field Communication’s card emulation mode is a way to combine smartcards with a mobile phone. Relay attack scenarios are well-known for contactless smartcards. In the past, relay attacks have only been considered for the case, where an attacker has physical proximity to an NFC-enabled mobile phone. However, a mobile phone introduces a significantly di↵erent threat vector. A mobile phone’s ...

2009
Michalis Polychronakis Kostas G. Anagnostakis Evangelos P. Markatos

As state-of-the-art attack detection technology becomes more prevalent, attackers have started to employ evasion techniques such as code obfuscation and polymorphism to defeat existing defenses. We have recently proposed network-level emulation, a heuristic detection method that scans network traffic to detect polymorphic attacks. Our approach uses a CPU emulator to dynamically analyze every po...

2007
Saikat Guha Paul Francis

The Domain Name System (DNS) is the only globally deployed Internet service that provides user-friendly naming for Internet hosts. It was originally designed to return the same answer to any given query regardless of who may have issued the query, and thus all data in the DNS is assumed to be public. Such an assumption potentially conflicts with the privacy policies of private Internet hosts, p...

Journal: :IEEE Trans. on CAD of Integrated Circuits and Systems 1999
Darko Kirovski Miodrag Potkonjak Lisa M. Guerra

Growing design complexity has made functional debugging of application-specific integrated circuits crucial to their development. Two widely used debugging techniques are simulation and emulation. Design simulation provides good controllability and observability of the variables in a design, but is two to ten orders of magnitude slower than the fabricated design. Design emulation and fabricatio...

2003
Hani T. Jamjoom Kang G. Shin

Client emulation tools play a central role in the performance evaluation, capacity planning, and workload characterization of servers. However, traditional emulation tools, because of their limited scalability and extensibility, fail to keep up with servers as they increase in complexity and performance. In this paper, we propose Eve, a scalable client emulation tool that is capable of stress-t...

2006
Vincent Guffens Georges Bastin Olivier Bonaventure

In this paper, a novel approach for wireless network emulation is proposed. The emulation infrastructure is built on a virtualized Linux kernel (User Mode Linux) which allows for highly realistic emulations. The virtualized kernel is extended with software based wireless cards which are plugged in a generic physical layer emulator. The emulator proposed in this paper tries to reduce the gap bet...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید