Sciweavers

180 search results - page 10 / 36
» Modular Protections against Non-control Data Attacks
Sort
View
CCS
2004
ACM
14 years 4 months ago
Cryptanalysis of a provably secure CRT-RSA algorithm
We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we...
David Wagner
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 11 months ago
Security Mitigations for Return-Oriented Programming Attacks
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomiz...
Piotr Bania
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 2 months ago
Non-linear Residue Codes for Robust Public-Key Arithmetic
We present a scheme for robust multi-precision arithmetic over the positive integers, protected by a novel family of non-linear arithmetic residue codes. These codes have a very hi...
Gunnar Gaubatz, Berk Sunar, Mark G. Karpovsky
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
14 years 5 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
WWW
2008
ACM
14 years 11 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida