Search
Search Results
-
From Passive Defense to Proactive Defence: Strategies and Technologies
The goal of network defense mechanisms is to enable systems to actively detect and withstand attacks, reduce reliance on external security measures,... -
MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile
In recent years, Censorship and anti-censorship technology is develo** rapidly. The censorship and surveillance systems track traffic on the...
-
Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes
While storing documents on the cloud can be attractive, the question remains whether cloud providers can be trusted with storing private documents.... -
Sha** Attacker Behavior: Evaluation of an Enhanced Cyber Maneuver Framework
Recent cyberattacks highlight the limitations of perimeter-based defenses and the need for a multi-layered approach to cybersecurity. Modern... -
URAP: a new ultra-lightweight RFID authentication protocol in passive RFID system
RFID (Radio Frequency Identification) is a crucial application technology in the Internet of Things (IoT) technology. The IoT terminal device needs...
-
ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes
Zigbee is an energy-efficient wireless IoT protocol that is increasingly being deployed in smart home settings. In this work, we analyze the privacy... -
-
Mutual authentication protocol for low cost passive tag in RFID system
Internet of things (IoT) contains a massive number of “things” that are connected to the internet and communicates without human interaction. In...
-
Ambiguity attacks on the digital image watermarking using discrete wavelet transform and singular value decomposition
In this paper, we present two ambiguity attacks on a watermarking algorithm based on discrete wavelet transform (DWT) and singular value...
-
High-Performance Estimation of Jamming Covariance Matrix for IRS-Aided Directional Modulation Network with a Malicious Attacker
In this chapter, we investigate the anti-jamming problem of a DM system with the aid of IRS. As an efficient tool to combat malicious jamming,... -
Early Detection of Spam Domains with Passive DNS and SPF
Spam domains are sources of unsolicited mails and one of the primary vehicles for fraud and malicious activities such as phishing campaigns or... -
Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training
Federated learning is an emerging paradigm that enables multiple organizations to jointly train a model without revealing their private data. As an...
-
Steal from Collaboration: Spy Attack by a Dishonest Party in Vertical Federated Learning
Vertical federated learning (VFL) is an emerging paradigm that enables multiple companies to collaboratively train a global model without disclosing... -
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks
Supply chain attacks are potent cyber attacks for widespread ramifications by compromising supply chains. Supply chain attacks are difficult to...
-
Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC
This paper presents an analysis on the state of the art of several proposals for algorithmic countermeasures to prevent passive side-channel attacks...
-
Time sensitive networking security: issues of precision time protocol and its implementation
Time Sensitive Networking (TSN) will be an integral component of industrial networking. Time synchronization in TSN is provided by the IEEE-1588,...
-
Automated Attacker Synthesis for Distributed Protocols
Distributed protocols should be robust to both benign malfunction (e.g. packet loss or delay) and attacks (e.g. message replay). In this paper we... -
Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism
Security challenges in complex information technologies continue to grow and diversify. To improve network security, many researchers have explored...
-
DLP: towards active defense against backdoor attacks with decoupled learning process
Deep learning models are well known to be susceptible to backdoor attack, where the attacker only needs to provide a tampered dataset on which the...