安心地散步 发表于 2025-3-26 23:15:48

Analysis of Topology Poisoning Attacks in Software-Defined Networkinga secure control channel. While this architecture avoids many security issues of distributed routing protocols, SDN remains vulnerable to topology poisoning attacks during topology discovery. Faked link information can cause wrong routing decisions by the controller and, thus, enable the attacker to

Inexorable 发表于 2025-3-27 03:01:35

Client-Side Vulnerabilities in Commercial VPNse client’s traffic over an encrypted tunnel to a VPN gateway in the cloud. Thus, they hide the client’s real IP address from online services, and they also shield the user’s connections from perceived threats in the access networks. In this paper, we study the security of such commercial VPN service

collagen 发表于 2025-3-27 08:29:27

Securing Optical Networks by Modern Cryptographic Techniquesptical networks are based on cryptographic technology. Various security solutions using cryptographic techniques have been adapted in current optical networks. In this paper, we investigate advanced cryptographic techniques to ensure the long-term security of optical networks.

FATAL 发表于 2025-3-27 12:21:33

A Roadmap for Improving the Impact of Anti-ransomware Researchntinually growing and costly threat across the globe, therefore efforts have been made both in academia and industry to develop techniques that can help to detect and recover from ransomware attacks. This paper aims to provide an overview of the current landscape of Windows-based anti-ransomware too

根除 发表于 2025-3-27 13:39:21

An Experimental Analysis of Cryptojacking Attackstal analysis of how different types of cryptojacking attacks impact a selection of consumer-grade devices, and the perceived annoyance by the user. This is seen in relation to the expected cost and revenue the attacker would expect. The results show that a well-configured cryptojacking attack does n

Harness 发表于 2025-3-27 19:48:24

My Smartwatch Is Mine – Machine Learning Based Theft Detection of Smartwatchesent a first machine learning based theft detection approach running in a user’s domain, relying solely on data of his smartwatch and thus not involving third parties. Hence, we collect data from multiple persons to first show that there is an exploitable structure within data provided by a smartwatc

未完成 发表于 2025-3-28 01:55:32

http://reply.papertrans.cn/87/8633/863295/863295_37.png

Infiltrate 发表于 2025-3-28 03:25:10

A Study of Security Vulnerabilities and Software Weaknesses in Vehicles information is gathered for 60 vehicle OEMs (Original Equipment Manufacturers) and common vehicle components from the National Vulnerability Database (NVD). Each vulnerability (CVE) is analyzed with respect to its software weakness type (CWE) and severity score (CVSS). 44 unique CVEs were found in

谦卑 发表于 2025-3-28 08:33:29

Experimental Analysis of the Laser-Induced Instruction Skip Fault Modeluction skips induced at runtime proved to be effective against identification routines or encryption algorithms. Several research works assessed a fault model that consists in a single instruction skip, i.e. the ability to prevent one chosen instruction in a program from being executed. This assessm

GEM 发表于 2025-3-28 13:21:19

Can Microkernels Mitigate Microarchitectural Attacks? on the Genode microkernel framework using three different kernels, Okl4, Nova, and Linux. We try to answer the question whether the strict process separation provided by Genode combined with security-oriented kernels such as Okl4 and Nova can mitigate microarchitectural attacks. We evaluate the att
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Secure IT Systems; 24th Nordic Conferen Aslan Askarov,René Rydhof Hansen,Willard Rafnsson Conference proceedings 2019 Springer Nature Switz