نتایج جستجو برای: primary user emulation attack

تعداد نتایج: 950393  

2003
Ken Yocum Ethan Eade Julius Degesys David Becker Jeffrey S. Chase Amin Vahdat

Scalability is the primary challenge to studying large complex network systems with network emulation. This paper studies topology partitioning, assigning disjoint pieces of the network topology across processors, as a technique to increase emulation capacity with increasing hardware resources. We develop methods to create partitions based on expected communication across the topology. Our eval...

2010
LOUIS GALLENSON

For some applications the native machine is not the system of choice in which to develop software, as when the target machine is unavailable (because it is still being developed, is obsolete, or is inaccessible) or inconvenient (as when there is minimal target-system support for debugging). In such cases, simulation or emulation may be preferred. Simulation has the advantage of giving the user ...

2008
Russell Thomas Hunt Frans Kaashoek Gregory R. Ganger

Operating system (OS) emulation consists of running a binary executable intended for a particular OS on a different OS. This ability allows users to run more programs and OS manufacturers to jumpstart new OSs with non-native programs. There are several OSs that can run binaries compiled for the same processor but for different operating systems. There are also systems that can run multiple OS s...

2009
Michalis Polychronakis Kostas G. Anagnostakis Evangelos P. Markatos

As state-of-the-art attack detection technology becomes more prevalent, attackers have started to employ evasion techniques such as code obfuscation and polymorphism to defeat existing defenses. We have recently proposed network-level emulation, a heuristic detection method that scans network traffic to detect polymorphic attacks. Our approach uses a CPU emulator to dynamically analyze every po...

2011
Christos Siaterlis Andres Perez-Garcia Marcelo Masera

The detection, coordination and response capabilities of critical infrastructure operators ultimately determine the economic and societal impact of infrastructure disruptions. Operational cyber security exercises are an important element of preparedness activities. Emulation testbeds are a promising approach for conducting multi-party operational cyber exercises. This paper demonstrates how an ...

2011
Christos Siaterlis Andres Perez-Garcia Marcelo Masera

The detection, coordination and response capabilities of critical infrastructure operators ultimately determine the economic and societal impact of infrastructure disruptions. Operational cyber security exercises are an important element of preparedness activities. Emulation testbeds are a promising approach for conducting multi-party operational cyber exercises. This paper demonstrates how an ...

Journal: :IACR Cryptology ePrint Archive 2015
Trupil Limbasiya Nishant Doshi

In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common session key by authenticating each other. Recently in 2014, Kumari et al. proposed the efficient scheme for remote user authentication. However in this paper, we show that the Kumari et al.’s scheme is v...

1997
Martin Steppler Matthias Lott

This paper presents a new tool, named SDL Performance Evaluation Tool (SPEET) 2 , for the performance analysis of formally speciied systems under real{time conditions. SPEET facilitates the simulation and emulation of several formal speciications at the same time. The systems to be simulated, resp. to be emulated, can be triggered by traac load generators and can be interconnected with transmis...

2014
Rijnard van Tonder Herman Arnold Engelbrecht

Increased focus on the Universal Serial Bus (USB) attack surface of devices has recently resulted in a number of new vulnerabilities. Much of this advance has been aided by the advent of hardware-based USB emulation techniques. However, existing tools and methods are far from ideal, requiring a significant investment of time, money, and effort. In this work, we present a USB testing framework t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید