Sciweavers

143 search results - page 24 / 29
» Strategies against Replay Attacks
Sort
View
CN
2007
106views more  CN 2007»
13 years 7 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
CCS
2007
ACM
14 years 1 months ago
Implementing and testing dynamic timeout adjustment as a dos counter-measure
In this paper we experimentally analyse various dynamic timeout adjustment strategies in server queues as potential counter-measures against degradation of service attacks. Previo...
Daniel Boteanu, Edouard Reich, José M. Fern...
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 1 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 5 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
ICMCS
2006
IEEE
131views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Wavelet-based Color Image Watermarking using Adaptive Entropy Casting
An adaptive robust image watermarking technique for color image authentication is proposed. In the proposed approach, the Y channel of a Yuv color host image and a concatenated RG...
Ming-Shing Hsieh, Din-Chang Tseng