This paper describes a new class of denial-of-service (DoS) attack, which we refer to as Second Order DoS attacks. These attacks consist of two phases, one that pollutes a databas...
IMSI catching is a problem on all generations of mobile telecommunication networks, i.e., 2G (GSM, GPRS), 3G (HDSPA, EDGE, UMTS) and 4G (LTE, LTE+). Currently, the SIM card of a m...
Fabian van den Broek, Roel Verdult, Joeri de Ruite...
Designing secure cyber-physical systems (CPS) is a particularly difficult task since security vulnerabilities stem not only from traditional cybersecurity concerns, but also physi...
Ivan Ruchkin, Ashwini Rao, Dionisio de Niz, Sagar ...
Encrypting data on client-side before uploading it to a cloud storage is essential for protecting users’ privacy. However client-side encryption is at odds with the standard pra...
Sybil attacks present a significant threat to many Internet systems and applications, in which a single adversary inserts multiple colluding identities in the system to compromis...
Changchang Liu, Peng Gao, Matthew K. Wright, Prate...