Sciweavers

35 search results - page 7 / 7
» Protecting RSA against Fault Attacks: The Embedding Method
Sort
View
CCS
2005
ACM
13 years 11 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
CASES
2005
ACM
13 years 7 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
CSREASAM
2006
13 years 7 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
JEI
2006
113views more  JEI 2006»
13 years 5 months ago
Transparent robust information hiding for ownership verification
For copyright protection, the robustness of a watermarking scheme against various attacks is an essential requirement. Many proposed robust watermarking schemes may achieve good r...
Dan Yu, Farook Sattar, Sirajudeen Gulam Razul
CASES
2008
ACM
13 years 7 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar