Sciweavers

3451 search results - page 125 / 691
» Collaborative attack modeling
Sort
View
138
Voted
CN
1998
118views more  CN 1998»
15 years 2 months ago
Predicting Network Traffic for Collaborative Virtual Environments
We introduce a method for predicting the network traffic that will be generated by Collaborative Virtual Environment applications with varying numbers of participants. Statistical...
Chris Greenhalgh, Steve Benford, Adrian Bullock, N...
WDAG
2005
Springer
101views Algorithms» more  WDAG 2005»
15 years 8 months ago
Keeping Denial-of-Service Attackers in the Dark
Abstract. We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that can eavesdrop on messages, or parts thereof, but with so...
Gal Badishi, Amir Herzberg, Idit Keidar
ACNS
2010
Springer
185views Cryptology» more  ACNS 2010»
15 years 7 months ago
Adaptive Chosen-Message Side-Channel Attacks
Most side-channel attacks that have been published in the open literature assume known- or chosen-message adversarial scenarios. In this paper, we analyze the increase of the attac...
Nicolas Veyrat-Charvillon, François-Xavier ...
SP
2009
IEEE
15 years 9 months ago
Exploiting Unix File-System Races via Algorithmic Complexity Attacks
We defeat two proposed Unix file-system race condition defense mechanisms. First, we attack the probabilistic defense mechanism of Tsafrir, et al., published at USENIX FAST 2008[...
Xiang Cai, Yuwei Gui, Rob Johnson
ACSAC
2008
IEEE
15 years 9 months ago
On Purely Automated Attacks and Click-Based Graphical Passwords
We present and evaluate various methods for purely automated attacks against click-based graphical passwords. Our purely automated methods combine click-order heuristics with focu...
Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oo...