• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,957
Next 10 →

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks

by Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili , 2003
"... this paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resili ..."
Abstract - Cited by 552 (18 self) - Add to MetaCart
-scale network breaches to an adversary, and makes it necessary for the adversary to attack a large fraction of the network before it can achieve any significant gain

Secure spread spectrum watermarking for multimedia

by Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, Talal Shamoon - IEEE TRANSACTIONS ON IMAGE PROCESSING , 1997
"... This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gauss ..."
Abstract - Cited by 1100 (10 self) - Add to MetaCart
.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression

The Computational Brain.

by P S Churchland , T J Sejnowski , Bruce Bridgeman , 1994
"... Keywords: reductionism, neural networks, distributed coding, Karl Pribram, computational neuroscience, receptive field 1.1 The broad goal of this book, expressed at the start, is ``to understand how neurons give rise to a mental life.'' A mental reductionism is assumed in this seductively ..."
Abstract - Cited by 450 (7 self) - Add to MetaCart
PDP (parallel distributed processing, or artificial neural network) models were too biologically unrealistic to provide viable interpretations of the single-cell data. Churchland and Sejnowski show how distributed models can now attack this problem, providing significant insights into brain function

Low Cost Attacks on Tamper Resistant Devices

by Ross Anderson, Markus Kuhn , 1997
"... . There has been considerable recent interest in the level of tamper resistance that can be provided by low cost devices such as smartcards. It is known that such devices can be reverse engineered using chip testing equipment, but a state of the art semiconductor laboratory costs millions of dollars ..."
Abstract - Cited by 291 (10 self) - Add to MetaCart
failure which may not require any special equipment at all. We describe and give examples of each of these. Some of our attacks are significant improvements on the state of the art; others are useful cautionary tales. Together, they show that building tamper resistant devices, and using them effectively

Advanced and Authenticated Marking Schemes for IP Traceback

by Dawn Xiaodong Song, Adrian Perrig - IN: PROCEEDINGS OF IEEE INFOCOM CONFERENCE , 2000
"... Defending against distributed denial-of-service attacks is one of the hardest security problems on the Internet today. One difficulty to thwart these attacks is to trace the sourec of the attacks because they often use incorrect, or spoofed IP source addresses to disguide the true origin. In this pa ..."
Abstract - Cited by 316 (7 self) - Add to MetaCart
work, our techniques have significantly higher precision (lower false positive rate) and lower computation overhead for the victim to reconstruct the attack paths under large scale distributed denial-of-service attacks. Furthermore the Authenticaed Marking Scheme provides efficient authentication

On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets

by Kihong Park, Heejo Lee - In Proc. ACM SIGCOMM , 2001
"... Denial of service (DoS) attack on the Internet has become a pressing problem. In this paper, we describe and evaluate route-based distributed packet filtering (DPF), a novel approach to distributed DoS (DDoS) attack prevention. We show that DPF achieves proactiveness and scalability, and we show tha ..."
Abstract - Cited by 278 (7 self) - Add to MetaCart
that there is an intimate relationship between the effectiveness of DPF at mitigating DDoS attack and powerlaw network topology. The salient features of this work are two-fold. First, we show that DPF is able to proactively filter out a significant fraction of spoofed packet flows and prevent attack packets from reaching

Countering Code-Injection Attacks With Instruction-Set Randomization

by Gaurav S. Kc - In Proceedings of the ACM Computer and Communications Security (CCS) Conference , 2003
"... We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized instruction sets (e.g., machine instructions) of the system executing potentially vulnerable software. An attacker who does ..."
Abstract - Cited by 234 (26 self) - Add to MetaCart
, and the bochs-x86 emulator. Although the performance penalty is significant, our prototype demonstrates the feasibility of the approach, and should be directly usable on a suitable-modified processor (e.g., the Transmeta Crusoe). Our approach is equally applicable against code-injecting attacks in scripting

Distributed detection of node replication attacks in sensor networks

by Bryan Parno, Adrian Perrig, Virgil Gligor - PROCEEDINGS OF THE IEEE SYMPOSIUM ON SECURITY AND PRIVACY , 2005
"... The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks ma ..."
Abstract - Cited by 206 (3 self) - Add to MetaCart
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Such attacks

Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols

by Yih-chun Hu, Adrian Perrig, David B. Johnson - in ACM Workshop on Wireless Security (WiSe , 2003
"... In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many proposed routing protocols for ad hoc networks operate in an on-demand fashion, as on-demand routing protocols have been ..."
Abstract - Cited by 216 (4 self) - Add to MetaCart
shown to often have lower overhead and faster reaction time than other types of routing based on periodic (proactive) mechanisms. Significant attention recently has been devoted to developing secure routing protocols for ad hoc networks, including a number of secure ondemand routing protocols

Transparent Run-Time Defense Against Stack Smashing Attacks

by Arash Baratloo, Navjot Singh, Timothy Tsai - In Proceedings of the USENIX Annual Technical Conference , 2000
"... The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks. In contrast to previous work, the new methods work with any existing pre-compiled executable and can be used tran ..."
Abstract - Cited by 204 (3 self) - Add to MetaCart
The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks. In contrast to previous work, the new methods work with any existing pre-compiled executable and can be used
Next 10 →
Results 1 - 10 of 6,957
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University