نتایج جستجو برای: attack aware

تعداد نتایج: 156044  

2016
Suresh Babu Maria Lavanya

Address for Correspondence Head of the Department, PG Student, Kamaraj College of Engineering and Technology, Virudhunagar, Tamilnadu India. ABSTRACT In this paper to propose an approach for detecting the presence of malicious attack which is commonly known as primary user emulation attack (PUEA), this type of attack act as the primary signal and delude the secondary user and occupy the whole f...

2014
Thidapat Chantem Ryan M. Gerdes

A cyber-physical system (CPS) must continue to meet minimum performance requirements under extreme conditions, such as in the presence of security breaches. Existing security-aware techniques and analyses focus on pre-attack countermeasures and do not consider the impact of security attacks on real-time performance. We propose a post-attack node and load allocation algorithm for CPSs that must ...

2010
Jörn-Marc Schmidt Marcel Medwed

Security-aware embedded devices which are likely to operate in hostile environments need protection against physical attacks. For the RSA public-key algorithm, protected versions of the Montgomery powering ladder have gained popularity as countermeasures for such attacks. In this paper, we present a general fault attack against RSA implementations which use the Montgomery powering ladder. In a ...

Journal: :IACR Cryptology ePrint Archive 2014
Ravikumar Selvam Dillibabu Shanmugam Suganya Annadurai

Over a decade, cryptographers are more attentive on designing lightweight ciphers in focus to compact cryptographic devices. More often, the security of these algorithms are defined in terms of its resistance to mathematical cryptanalysis methods. Nevertheless, designers are well aware of implementation attacks and concentrating on new design strategies to improve the defence quality against im...

2005
Richard Clayton Drew Dean Markus Jakobsson Steven Myers Stuart G. Stubblebine Michael Szydlo

A first contribution of this paper is a theoretical yet practically applicable model covering a large set of phishing attacks, aimed towards developing an understanding of threats relating to phishing. We model an attack by a phishing graph in which nodes correspond to knowledge or access rights, and (directed) edges correspond to means of obtaining information or access rights from already pos...

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

2011
Donovan Hill Jasmine Blunt Terrence Pugh Monika Monk Ji-Sun Kim Woodrow W. Winchester D. Scott McCrickard Paul Estabrooks Felicia R. Doswell

This paper describes an effort to address life-threatening diseases and health conditions through engaging use of mobile devices. The design targeted children ages 7-11, with a goal of becoming aware of the nutritional value of foods that they eat on a regular basis. The implementation efforts resulted in Health Attack, a matching and memory game that seeks to raise the knowledgelevel of partic...

Journal: :Systems Engineering 2012
Rick A. Jones Barry M. Horowitz

As exemplified in the 2010 Stuxnet attack on an Iranian nuclear facility, attackers have the capabilities to embed infections in equipment that is employed in nuclear power systems. In this paper, a new systems engineering focused approach for mitigating such risks is described. This approach involves the development of a security architectural formulation that integrates a set of reusable secu...

Journal: :Journal of Computer Security 2007
Ricardo Corin Sandro Etalle Pieter H. Hartel Angelika Mader

We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL. Further, a taxonomy is obtained by studying and categorising protocols from the we...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید