Sciweavers

3451 search results - page 15 / 691
» Collaborative attack modeling
Sort
View
ASIACRYPT
2009
Springer
14 years 9 days ago
PSS Is Secure against Random Fault Attacks
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RS...
Jean-Sébastien Coron, Avradip Mandal
ACSAC
2004
IEEE
13 years 11 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
ASM
2008
ASM
13 years 9 months ago
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocol...
Nazim Benassa
CRIWG
1998
13 years 9 months ago
A Cooperation Model for Teaching/Learning Modeling Disciplines
The use of new technology must be combined with modern teaching practices to be effective. Collaborative learning is a general term employed for a variety of classroom practices d...
Karin Becker, L. Zanella
JPDC
2006
87views more  JPDC 2006»
13 years 7 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...