نتایج جستجو برای: multistep attack scenario

تعداد نتایج: 176512  

Journal: :IACR Cryptology ePrint Archive 2008
Zbigniew Golebiewski Krzysztof Majcher Filip Zagórski Marcin Zawada

HB and HB+ are a shared secret-key authentication protocols designed for low-cost devices such as RFID tags. HB+ was proposed by Juels and Weis at Crypto 2005. The security of the protocols relies on the learning parity with noise (LPN) problem, which was proven to be NP-hard. The best known attack on LPN by Levieil and Fouque [13] requires subexponential number of samples and sub-exponential n...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

Water is the most essential component for sustaining lives of humans and other living creatures. Supplying potable water with adequate residual pressure is a fundamental responsibility of city administration, which they do during normal conditions. But sometimes, abnormal conditions are formed resulting pressure deficient conditions during the daily operations of water distribution networks. Th...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2010
Michael Assaf Baruch Meerson

We investigate the phenomenon of extinction of a long-lived self-regulating stochastic population, caused by intrinsic (demographic) noise. Extinction typically occurs via one of two scenarios depending on whether the absorbing state n=0 is a repelling (scenario A) or attracting (scenario B) point of the deterministic rate equation. In scenario A the metastable stochastic population resides in ...

2015
Heng Zhang Peng Cheng Ling Shi Jiming Chen

Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some attacking patterns. In this paper, we investigate how an attacker should schedule its Denial-of-Service (DoS) attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote ...

Journal: :EURASIP J. Information Security 2007
Alessandro Piva Mauro Barni

The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investigate how and when an image watermarking system can be broken while preserving the highest possible quality of the content, in the case the watermarking system is subject to a massive worldwi...

2016
Changwei Liu Anoop Singhal Duminda Wijesekera

Cloud computing provides several benefits to organizations such as increased flexibility, scalability and reduced cost. However, it provides several challenges for digital forensics and criminal investigation. Some of these challenges are the dependence of forensically valuable data on the deployment model, multiple virtual machines running on a single physical machine and multiple tenancies of...

Journal: :EURASIP J. Wireless Comm. and Networking 2010
Honglong Chen Wei Lou Zhi Wang

Recent advances in wireless networking technologies, along with ubiquitous sensing and computing, have brought significant convenience for location-based services. The localization issue in wireless sensor networks under the nonadversarial scenario has already been well studied. However, most existing localization schemes cannot provide satisfied performance under the adversarial scenario. In t...

2003
Xinzhou Qin Wenke Lee

With the increasingly widespread deployment of security mechanisms, such as firewalls, intrusion detection systems (IDSs), antivirus software and authentication services, the problem of alert analysis has become very important. The large amount of alerts can overwhelm security administrators and prevent them from adequately understanding and analyzing the security state of the network, and init...

2009
Sachin Kadloor Xun Gong Negar Kiyavash Tolga Tezcan Nikita Borisov

This paper presents a nefarious low-cost traffic analysis attack in packet-based networks, such as the Internet. The attack is mountable in any scenario where a shared routing resource exists among users. A real-world attack successfully compromised the privacy of a user without requiring significant resources in terms of access, memory, or computational power. The effectiveness of our attack i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید