Cybersecurity

Công bố khoa học tiêu biểu

* Dữ liệu chỉ mang tính chất tham khảo

Sắp xếp:  
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
Cybersecurity - Tập 3 - Trang 1-19 - 2020
Lili Xu, Mingjie Xu, Feng Li, Wei Huo
The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems. Automatically identifying this kind of vulnerability is critical for software security. Despite many works have been done to mitigate integer overflow, existing tools either report large number of false positives or introduce unacceptable time consumptio...... hiện toàn bộ
Time sensitive networking security: issues of precision time protocol and its implementation
Cybersecurity - Tập 6 - Trang 1-13 - 2023
Davide Berardi, Nils O. Tippenhauer, Andrea Melis, Marco Prandini, Franco Callegati
Time Sensitive Networking (TSN) will be an integral component of industrial networking. Time synchronization in TSN is provided by the IEEE-1588, Precision Time Protocol (PTP) protocol. The standard, dating back to 2008, marginally addresses security aspects, notably not encompassing the frames designed for management purposes (Type Length Values or TLVs). In this work we show that the TLVs can be...... hiện toàn bộ
An efficient permutation approach for SbPN-based symmetric block ciphers
Cybersecurity - Tập 6 - Trang 1-18 - 2023
Mir Nazish, M. Tariq Banday, Insha Syed, Sheena Banday
It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end constrained devices. Therefore, an efficient hardware design approach that requires some specific hardware resource may not be efficient if implemented in software. Substitution bit Permu...... hiện toàn bộ
CCA1 secure FHE from PIO, revisited
Cybersecurity - - 2018
Biao Wang, Xueqing Wang, Rui Xue
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing
Cybersecurity - Tập 1 - Trang 1-11 - 2018
Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu
It is fundamentally challenging to build a secure system atop the current computer architecture. The complexity in software, hardware and ASIC manufacture has reached beyond the capability of existing verification methodologies. Without whole-system verification, current systems have no proven security. It is observed that current systems are exposed to a variety of attacks due to the existence of...... hiện toàn bộ
Enhancing non-profiled side-channel attacks by time-frequency analysis
Cybersecurity - Tập 6 - Trang 1-26 - 2023
Chengbin Jin, Yongbin Zhou
Side-channel analysis (SCA) has become an increasing important method to assess the physical security of cryptographic systems. In the process of SCA, the number of attack data directly determines the performance of SCA. With sufficient attack data, the adversary can achieve a successful SCA. However, in reality, the cryptographic device may be protected with some countermeasures to limit the numb...... hiện toàn bộ
Iso-UniK: lightweight multi-process unikernel through memory protection keys
Cybersecurity - Tập 3 - Trang 1-14 - 2020
Guanyu Li, Dong Du, Yubin Xia
Unikernel, specializing a minimalistic libOS with an application, is an attractive design for cloud computing. However, the Achilles’ heel of unikernel is the lack of multi-process support, which makes it less flexible and applicable. Many applications rely on the process abstraction to isolate different components. For example, Apache with the multi-processing module isolates a request handler in...... hiện toàn bộ
Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies
Cybersecurity - Tập 2 - Trang 1-25 - 2019
Manar Alohaly, Hassan Takabi, Eduardo Blanco
The National Institute of Standards and Technology (NIST) has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language access control policy (NLACP) to a machine-readable form. To study the automation process, we consider the hierarchical ABAC model as our reference model since it better reflects the requ...... hiện toàn bộ
LayerCFL: an efficient federated learning with layer-wised clustering
Cybersecurity - Tập 6 Số 1 - Trang 1-14 - 2023
Yuan, Jie, Qian, Rui, Yuan, Tingting, Sun, Mingliang, Li, Jirui, Li, Xiaoyong
Federated Learning (FL) suffers from the Non-IID problem in practice, which poses a challenge for efficient and accurate model training. To address this challenge, prior research has introduced clustered FL (CFL), which involves clustering clients and training them separately. Despite its potential benefits, CFL can be computationally and communicationally expensive when the data distribution is u...... hiện toàn bộ
PosFuzz: augmenting greybox fuzzing with effective position distribution
Cybersecurity - Tập 6 - Trang 1-21 - 2023
Yanyan Zou, Wei Zou, JiaCheng Zhao, Nanyu Zhong, Yu Zhang, Ji Shi, Wei Huo
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and effectiveness. Mutation-based greybox fuzzing generates input cases by mutating the input seed, i.e., applying a sequence of mutation operators to randomly selected mutation positions of the seed. Ho...... hiện toàn bộ
Tổng số: 137   
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10