Sciweavers

21 search results - page 2 / 5
» Model-Based Analysis of Configuration Vulnerabilities
Sort
View
ATVA
2008
Springer
121views Hardware» more  ATVA 2008»
14 years 11 months ago
Model Based Importance Analysis for Minimal Cut Sets
We show how fault injection together with recent advances in stochastic model checking can be combined to form a crucial ingredient for improving quantitative safety analysis. Base...
Eckard Böde, Thomas Peikenkamp, Jan Rakow, Sa...
SOUPS
2006
ACM
15 years 3 months ago
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns t...
Furkan Tari, A. Ant Ozok, Stephen H. Holden
CHES
2000
Springer
204views Cryptology» more  CHES 2000»
15 years 1 months ago
Using Second-Order Power Analysis to Attack DPA Resistant Software
Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Anal...
Thomas S. Messerges
AAAI
2006
14 years 10 months ago
Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Bamshad Mobasher, Robin D. Burke, Jeff J. Sandvig
DEBU
2008
186views more  DEBU 2008»
14 years 9 months ago
A Survey of Collaborative Recommendation and the Robustness of Model-Based Algorithms
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Jeff J. Sandvig, Bamshad Mobasher, Robin D. Burke