Cybersecurity

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
Cybersecurity - Tập 3 - Trang 1-19 - 2020
Lili Xu, Mingjie Xu, Feng Li, Wei Huo
The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems. Automatically identifying this kind of vulnerability is critical for software security. Despite many works have been done to mitigate integer overflow, existing tools either report large number of false positives or introduce unacceptable time consumptio...... hiện toàn bộ
Practical pairing-Free sensor cooperation scheme for cloud-Assisted wireless body area networks
Cybersecurity - Tập 3 - Trang 1-9 - 2020
Yuanzhao Song, Haowen Tan
Nowadays, the design and construction of efficient internet of things (IoTs) has become a new strategies for improving living quality of all aspects. Emerging as one of the most significant extension of medical IoTs, wireless body area networks (WBANs) is capable of monitoring crucial physiological and behavioral information through wearable sensors, offering a new paradigm for the next-generation...... hiện toàn bộ
Time sensitive networking security: issues of precision time protocol and its implementation
Cybersecurity - Tập 6 - Trang 1-13 - 2023
Davide Berardi, Nils O. Tippenhauer, Andrea Melis, Marco Prandini, Franco Callegati
Time Sensitive Networking (TSN) will be an integral component of industrial networking. Time synchronization in TSN is provided by the IEEE-1588, Precision Time Protocol (PTP) protocol. The standard, dating back to 2008, marginally addresses security aspects, notably not encompassing the frames designed for management purposes (Type Length Values or TLVs). In this work we show that the TLVs can be...... hiện toàn bộ
An efficient permutation approach for SbPN-based symmetric block ciphers
Cybersecurity - Tập 6 - Trang 1-18 - 2023
Mir Nazish, M. Tariq Banday, Insha Syed, Sheena Banday
It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end constrained devices. Therefore, an efficient hardware design approach that requires some specific hardware resource may not be efficient if implemented in software. Substitution bit Permu...... hiện toàn bộ
CCA1 secure FHE from PIO, revisited
Cybersecurity - - 2018
Biao Wang, Xueqing Wang, Rui Xue
Cancelable biometric schemes for Euclidean metric and Cosine metric
Cybersecurity - Tập 6 - Trang 1-20 - 2023
Yubing Jiang, Peisong Shen, Li Zeng, Xiaojie Zhu, Di Jiang, Chi Chen
The handy biometric data is a double-edged sword, paving the way of the prosperity of biometric authentication systems but bringing the personal privacy concern. To alleviate the concern, various biometric template protection schemes are proposed to protect the biometric template from information leakage. The preponderance of existing proposals is based on Hamming metric, which ignores the fact th...... hiện toàn bộ
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing
Cybersecurity - Tập 1 - Trang 1-11 - 2018
Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu
It is fundamentally challenging to build a secure system atop the current computer architecture. The complexity in software, hardware and ASIC manufacture has reached beyond the capability of existing verification methodologies. Without whole-system verification, current systems have no proven security. It is observed that current systems are exposed to a variety of attacks due to the existence of...... hiện toàn bộ
Enhancing non-profiled side-channel attacks by time-frequency analysis
Cybersecurity - Tập 6 - Trang 1-26 - 2023
Chengbin Jin, Yongbin Zhou
Side-channel analysis (SCA) has become an increasing important method to assess the physical security of cryptographic systems. In the process of SCA, the number of attack data directly determines the performance of SCA. With sufficient attack data, the adversary can achieve a successful SCA. However, in reality, the cryptographic device may be protected with some countermeasures to limit the numb...... hiện toàn bộ
Iso-UniK: lightweight multi-process unikernel through memory protection keys
Cybersecurity - Tập 3 - Trang 1-14 - 2020
Guanyu Li, Dong Du, Yubin Xia
Unikernel, specializing a minimalistic libOS with an application, is an attractive design for cloud computing. However, the Achilles’ heel of unikernel is the lack of multi-process support, which makes it less flexible and applicable. Many applications rely on the process abstraction to isolate different components. For example, Apache with the multi-processing module isolates a request handler in...... hiện toàn bộ
Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies
Cybersecurity - Tập 2 - Trang 1-25 - 2019
Manar Alohaly, Hassan Takabi, Eduardo Blanco
The National Institute of Standards and Technology (NIST) has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language access control policy (NLACP) to a machine-readable form. To study the automation process, we consider the hierarchical ABAC model as our reference model since it better reflects the requ...... hiện toàn bộ
Tổng số: 137   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10