Sciweavers

1294 search results - page 55 / 259
» Securing Against Insider Attacks
Sort
View
CHES
2004
Springer
216views Cryptology» more  CHES 2004»
15 years 7 months ago
Efficient Countermeasures against RPA, DPA, and SPA
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel a...
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
ESORICS
2009
Springer
16 years 4 months ago
Content Delivery Networks: Protection or Threat?
Content Delivery Networks (CDNs) are commonly believed to offer their customers protection against application-level denial of service (DoS) attacks. Indeed, a typical CDN with its...
Sipat Triukose, Zakaria Al-Qudah, Michael Rabinovi...
JMLR
2010
163views more  JMLR 2010»
14 years 11 months ago
Detection of Server-side Web Attacks
Web servers and server-side applications constitute the key components of modern Internet services. We present a pattern recognition system to the detection of intrusion attempts ...
Igino Corona, Giorgio Giacinto
CRYPTO
2008
Springer
95views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
Preimages for Reduced SHA-0 and SHA-1
In this paper, we examine the resistance of the popular hash function SHA-1 and its predecessor SHA-0 against dedicated preimage attacks. In order to assess the security margin of ...
Christophe De Cannière, Christian Rechberge...
EUROSYS
2008
ACM
16 years 1 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos