نتایج جستجو برای: attack aware
تعداد نتایج: 156044 فیلتر نتایج به سال:
Address for Correspondence Head of the Department, PG Student, Kamaraj College of Engineering and Technology, Virudhunagar, Tamilnadu India. ABSTRACT In this paper to propose an approach for detecting the presence of malicious attack which is commonly known as primary user emulation attack (PUEA), this type of attack act as the primary signal and delude the secondary user and occupy the whole f...
A cyber-physical system (CPS) must continue to meet minimum performance requirements under extreme conditions, such as in the presence of security breaches. Existing security-aware techniques and analyses focus on pre-attack countermeasures and do not consider the impact of security attacks on real-time performance. We propose a post-attack node and load allocation algorithm for CPSs that must ...
Security-aware embedded devices which are likely to operate in hostile environments need protection against physical attacks. For the RSA public-key algorithm, protected versions of the Montgomery powering ladder have gained popularity as countermeasures for such attacks. In this paper, we present a general fault attack against RSA implementations which use the Montgomery powering ladder. In a ...
Over a decade, cryptographers are more attentive on designing lightweight ciphers in focus to compact cryptographic devices. More often, the security of these algorithms are defined in terms of its resistance to mathematical cryptanalysis methods. Nevertheless, designers are well aware of implementation attacks and concentrating on new design strategies to improve the defence quality against im...
A first contribution of this paper is a theoretical yet practically applicable model covering a large set of phishing attacks, aimed towards developing an understanding of threats relating to phishing. We model an attack by a phishing graph in which nodes correspond to knowledge or access rights, and (directed) edges correspond to means of obtaining information or access rights from already pos...
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
This paper describes an effort to address life-threatening diseases and health conditions through engaging use of mobile devices. The design targeted children ages 7-11, with a goal of becoming aware of the nutritional value of foods that they eat on a regular basis. The implementation efforts resulted in Health Attack, a matching and memory game that seeks to raise the knowledgelevel of partic...
As exemplified in the 2010 Stuxnet attack on an Iranian nuclear facility, attackers have the capabilities to embed infections in equipment that is employed in nuclear power systems. In this paper, a new systems engineering focused approach for mitigating such risks is described. This approach involves the development of a security architectural formulation that integrates a set of reusable secu...
We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol, where timing information allows the study of different attack scenarios. We model check the protocols using UPPAAL. Further, a taxonomy is obtained by studying and categorising protocols from the we...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید