Sciweavers

381 search results - page 24 / 77
» Timing attacks on Web privacy
Sort
View
CCS
2008
ACM
13 years 9 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
SP
2006
IEEE
121views Security Privacy» more  SP 2006»
14 years 1 months ago
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques
Timing-based active watermarking schemes are developed to trace back attackers through stepping stone connections or anonymizing networks. By slightly changing packet timing, thes...
Pai Peng, Peng Ning, Douglas S. Reeves
IEEEARES
2006
IEEE
14 years 1 months ago
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
NDSS
2000
IEEE
14 years 3 days ago
A Lightweight Tool for Detecting Web Server Attacks
We present an intrusion-detection tool aimed at protecting web servers, and justify why such a tool is needed. We describe several interesting features, such as the ability to run...
Magnus Almgren, Hervé Debar, Marc Dacier
CCS
2003
ACM
14 years 29 days ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves