Mitigating Data-only Attacks by Protecting Memory-resident Sensitive Data
نویسندگان
چکیده
منابع مشابه
Protecting Sensitive Knowledge By Data Sanitization
In this paper, we address the problem of protecting some sensitive knowledge in transactional databases. The challenge is on protecting actionable knowledge for strategic decisions, but at the same time not losing the great benefit of association rule mining. To accomplish that, we introduce a new, efficient one-scan algorithm that meets privacy protection and accuracy in association rule minin...
متن کاملmodeling loss data by phase-type distribution
بیمه گران همیشه بابت خسارات بیمه نامه های تحت پوشش خود نگران بوده و روش هایی را جستجو می کنند که بتوانند داده های خسارات گذشته را با هدف اتخاذ یک تصمیم بهینه مدل بندی نمایند. در این پژوهش توزیع های فیزتایپ در مدل بندی داده های خسارات معرفی شده که شامل استنباط آماری مربوطه و استفاده از الگوریتم em در برآورد پارامترهای توزیع است. در پایان امکان استفاده از این توزیع در مدل بندی داده های گروه بندی ...
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem of protecting secret data, assuming an attacker is inside a target network or has compromised a system. We give a definition of the problem area, and propose a solution, VAST, that uses large, structured files to improv...
متن کاملProtecting Sensitive Data on a PC by a Custom Algorithm
To store secrets and sensitive data in secure ways is necessary in the modern life. Since most hardware technologies used to store sensitive data are expensive for a single user, it is very common to store this kind of data by the means of software or software implemented encryption procedures. If for example the secret to protect is the secret key in a Public Key Infrastructure environment it ...
متن کاملMitigating Cmp Memory Wall by Accurate Data Prefetching
3 To my wife and my parents 4 ACKNOWLEDGMENTS I would thank my advisor, Dr. Jih-Kwon Peir, for his guidance and support throughout the whole period of my graduate study. His depth of knowledge, insightful advice, tremendous hard-working, great passion and persistence has been instrumental in the completion of this work. I thank Dr. Ye Xia for numerous discussions, suggestions and help on my lat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital Threats: Research and Practice
سال: 2020
ISSN: 2692-1626,2576-5337
DOI: 10.1145/3419475