Mitigating Data-only Attacks by Protecting Memory-resident Sensitive Data

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting Sensitive Knowledge By Data Sanitization

In this paper, we address the problem of protecting some sensitive knowledge in transactional databases. The challenge is on protecting actionable knowledge for strategic decisions, but at the same time not losing the great benefit of association rule mining. To accomplish that, we introduce a new, efficient one-scan algorithm that meets privacy protection and accuracy in association rule minin...

متن کامل

modeling loss data by phase-type distribution

بیمه گران همیشه بابت خسارات بیمه نامه های تحت پوشش خود نگران بوده و روش هایی را جستجو می کنند که بتوانند داده های خسارات گذشته را با هدف اتخاذ یک تصمیم بهینه مدل بندی نمایند. در این پژوهش توزیع های فیزتایپ در مدل بندی داده های خسارات معرفی شده که شامل استنباط آماری مربوطه و استفاده از الگوریتم em در برآورد پارامترهای توزیع است. در پایان امکان استفاده از این توزیع در مدل بندی داده های گروه بندی ...

Protecting Secret Data from Insider Attacks

We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem of protecting secret data, assuming an attacker is inside a target network or has compromised a system. We give a definition of the problem area, and propose a solution, VAST, that uses large, structured files to improv...

متن کامل

Protecting Sensitive Data on a PC by a Custom Algorithm

To store secrets and sensitive data in secure ways is necessary in the modern life. Since most hardware technologies used to store sensitive data are expensive for a single user, it is very common to store this kind of data by the means of software or software implemented encryption procedures. If for example the secret to protect is the secret key in a Public Key Infrastructure environment it ...

متن کامل

Mitigating Cmp Memory Wall by Accurate Data Prefetching

3 To my wife and my parents 4 ACKNOWLEDGMENTS I would thank my advisor, Dr. Jih-Kwon Peir, for his guidance and support throughout the whole period of my graduate study. His depth of knowledge, insightful advice, tremendous hard-working, great passion and persistence has been instrumental in the completion of this work. I thank Dr. Ye Xia for numerous discussions, suggestions and help on my lat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Digital Threats: Research and Practice

سال: 2020

ISSN: 2692-1626,2576-5337

DOI: 10.1145/3419475