Sciweavers

2474 search results - page 9 / 495
» Attacks on Steganographic Systems
Sort
View
DSN
2007
IEEE
15 years 6 months ago
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks
Attacks exploiting race conditions have been considered rare and “low risk”. However, the increasing popularity of multiprocessors has changed this situation: instead of waiti...
Jinpeng Wei, Calton Pu
106
Voted
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
15 years 3 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
PERCOM
2011
ACM
14 years 3 months ago
Inference attacks by third-party extensions to social network systems
—We study inference attacks that can be launched via the extension API of Facebook. We explain the threat of these attacks through a reduction to authentication attacks, devise a...
Seyed Hossein Ahmadinejad, Mohd M. Anwar, Philip W...
ESORICS
2012
Springer
13 years 2 months ago
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris S...
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
15 years 5 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...