Sciweavers

2474 search results - page 11 / 495
» Attacks on Steganographic Systems
Sort
View
SSWMC
2004
15 years 1 months ago
New attacks on SARI image authentication system
The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been repo...
Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
13 years 2 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
AICS
2009
14 years 9 months ago
Robustness Analysis of Model-Based Collaborative Filtering Systems
Collaborative filtering (CF) recommender systems are very popular and successful in commercial application fields. However, robustness analysis research has shown that conventional...
Zunping Cheng, Neil Hurley
ACSAC
2004
IEEE
15 years 3 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 7 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson