Sciweavers

381 search results - page 22 / 77
» Timing attacks on Web privacy
Sort
View
PET
2009
Springer
14 years 2 months ago
Using Linkability Information to Attack Mix-Based Anonymity Services
There exist well established models for anonymity focusing on traffic analysis, i. e., analysing properties of single messages as, e. g., timing. However there is only little work ...
Stefan Schiffner, Sebastian Clauß
CCS
2007
ACM
14 years 1 months ago
Automated detection of persistent kernel control-flow attacks
This paper presents a new approach to dynamically monitoring operating system kernel integrity, based on a property called state-based control-flow integrity (SBCFI). Violations ...
Nick L. Petroni Jr., Michael W. Hicks
SP
2009
IEEE
123views Security Privacy» more  SP 2009»
14 years 2 months ago
DSybil: Optimal Sybil-Resistance for Recommendation Systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...
ACISP
2009
Springer
14 years 2 months ago
Towards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that ...
Douglas Stebila, Berkant Ustaoglu
SAFECOMP
2007
Springer
14 years 1 months ago
Survival by Deception
Abstract. A system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously un...
Martin Gilje Jaatun, Åsmund Ahlmann Nyre, Ja...