搜索结果: 1-14 共查到“计算机科学技术 Attacks”相关记录14条 . 查询时间(0.14 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A LASSO-based Detection and Identification Method on Actuator Integrity Attacks in Remote Control Systems
LASSO 远程控制系统 执行器 完整性 攻击检测 识别方法
2023/4/28
Using adversarial attacks to refine molecular energy predictions(图)
对抗性攻击 分子能量预测 量化神经网络 分子能量 不确定性
2023/6/7
New software continuously scrambles code to foil cyber attacks
New software continuously scrambles code foil cyber attacks
2016/11/29
As long as humans are writing software, there will be coding mistakes for malicious hackers to exploit. A single bug can open the door to attackers deleting files, copying credit card numbers or carry...
Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against Open...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users. Our system generate...
DNS rebinding attacks subvert the same-origin policy of browsers and convert them into open network proxies. We survey new DNS rebinding attacks that exploit the interaction between browsers and their...
Framing attacks on smart phones and dumb routers: tap-jacking and geo-localization attacks
smart phones and dumb routers geo-localization attacks
2015/8/5
While many popular web sites on the Internet use frame busting to defend against clickjacking, very few mobile sites use frame busting. Similarly, few embedded web sites such as those used on home rou...
Preventing pollution attacks in multi-source network coding
multi-source network coding pollution attacks
2015/8/5
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear c...
Open Shortest Path First (OSPF) is the most widely deployed interior gateway routing protocol on the Internet. We present two new attacks on OSPF that expose design vulnerabilities in the protocol spe...
The RSA cryptosystem, invented by Ron Rivest, Adi Shamir, and Len Adleman [21], was rst
publicized in the August 1977 issue of Scientic American. The cryptosystem is most commonly
used for providi...
We study the security of popular password managers and their policies on automatically filling in Web passwords. We examine browser built-in password managers, mobile password managers, and 3rd party ...
Hardening Software Against Memory Errors and Attacks
Memory Management Reliability Runtime Systems Security
2014/12/18
Programs written in C and C++ are susceptible to a number of memory errors, including buffer overflows and dangling pointers. At best, these errors cause crashes or performance degradation. At worst, ...
Proposal for a Ultra Low Voltage NAND gate to withstand Power Analysis Attacks
Differential Power Analysis (DPA) Low Voltage (LV) Ultra Low Voltage (ULV)
2010/2/2
In this paper we promote the Ultra Low Voltage (ULV)
NAND gate to replace either partly or entirely the encryption block
of a design to withstand power analysis attack.
Distributed denial of service (DDoS) attacks on the Internet have become an immediate problem. As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS)...