Sciweavers

21 search results - page 2 / 5
» Model-Based Analysis of Configuration Vulnerabilities
Sort
View
ATVA
2008
Springer
121views Hardware» more  ATVA 2008»
13 years 7 months ago
Model Based Importance Analysis for Minimal Cut Sets
We show how fault injection together with recent advances in stochastic model checking can be combined to form a crucial ingredient for improving quantitative safety analysis. Base...
Eckard Böde, Thomas Peikenkamp, Jan Rakow, Sa...
SOUPS
2006
ACM
13 years 11 months ago
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns t...
Furkan Tari, A. Ant Ozok, Stephen H. Holden
CHES
2000
Springer
204views Cryptology» more  CHES 2000»
13 years 9 months ago
Using Second-Order Power Analysis to Attack DPA Resistant Software
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Anal...
Thomas S. Messerges
AAAI
2006
13 years 6 months ago
Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Bamshad Mobasher, Robin D. Burke, Jeff J. Sandvig
DEBU
2008
186views more  DEBU 2008»
13 years 5 months ago
A Survey of Collaborative Recommendation and the Robustness of Model-Based Algorithms
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Jeff J. Sandvig, Bamshad Mobasher, Robin D. Burke