Sciweavers

372 search results - page 43 / 75
» On the Security of a Unified Countermeasure
Sort
View
EUROSEC
2009
ACM
14 years 2 months ago
Application-based TCP hijacking
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data ...
Oliver Zheng, Jason Poon, Konstantin Beznosov
HOST
2008
IEEE
14 years 2 months ago
Slicing Up a Perfect Hardware Masking Scheme
—Masking is a side-channel countermeasure that randomizes side-channel leakage, such as the power dissipation of a circuit. Masking is only effective on the condition that the in...
Zhimin Chen, Patrick Schaumont
WISA
2004
Springer
14 years 28 days ago
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack
Abstract. Encapsulating messages in onions is one of the major techniques providing anonymous communication in computer networks. To some extent, it provides security against trafï...
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kut...
ACSAC
2002
IEEE
14 years 17 days ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
ACSAC
2002
IEEE
14 years 17 days ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel