Sciweavers

704 search results - page 33 / 141
» A Practical Attack on KeeLoq
Sort
View
CONEXT
2007
ACM
14 years 1 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
GLOBECOM
2009
IEEE
14 years 4 months ago
Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks
Abstract—Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of th...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
IEEEARES
2008
IEEE
14 years 4 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
JNSM
2008
93views more  JNSM 2008»
13 years 9 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
FSE
2007
Springer
101views Cryptology» more  FSE 2007»
14 years 3 months ago
Producing Collisions for Panama, Instantaneously
We present a practical attack on the Panama hash function that generates a collision in 26 evaluations of the state updating function. Our attack improves that of Rijmen and cowork...
Joan Daemen, Gilles Van Assche