• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,254
Next 10 →

Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks

by Yih-chun Hu , 2003
"... Abstract — As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has n ..."
Abstract - Cited by 703 (15 self) - Add to MetaCart
routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. I.

A Secure Routing Protocol for Ad Hoc Networks

by Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer , 2002
"... Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distin ..."
Abstract - Cited by 508 (0 self) - Add to MetaCart
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments

k-anonymity: a model for protecting privacy.

by Latanya Sweeney - International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, , 2002
"... Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific guarantees ..."
Abstract - Cited by 1313 (15 self) - Add to MetaCart
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific

The Computational Brain.

by P S Churchland , T J Sejnowski , Bruce Bridgeman , 1994
"... Keywords: reductionism, neural networks, distributed coding, Karl Pribram, computational neuroscience, receptive field 1.1 The broad goal of this book, expressed at the start, is ``to understand how neurons give rise to a mental life.'' A mental reductionism is assumed in this seductively ..."
Abstract - Cited by 450 (7 self) - Add to MetaCart
in a number of domains. 1.2 The book has several parts. First, the authors introduce their approach, combining anatomical, physiological, behavioral and modelling methods in an integrated interdisciplinary attack on specific functional systems. There follows a review of enough anatomy

V.: An active intrusion detection system for lan specific attacks

by N Hubballi, S Roopa, R. Ratti, F. A. Barbhuiya, S Biswas, A Sur - The 4th International Conference on Information Security and Assurance, (2010) In
"... Abstract. Local Area Network (LAN) based attacks are due to compromised hosts in the network and mainly involve spoofing with falsified IP-MAC pairs. Since Address Resolution Protocol (ARP) is a stateless protocol such attacks are possible. Several schemes have been proposed in the literature to cir ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
to circum-vent these attacks, however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose an Intrusion Detection System (IDS) for LAN specific attacks with-out any extra constraint like static IP-MAC, changing

802.11 denial-of-service attacks: Real vulnerabilities and practical solutions

by John Bellardo, Stefan Savage - in Proceedings of the USENIX Security Symposium, Washington D.C , 2003
"... The convenience of 802.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors. However, this use is predicated on an implicit assumption of confidentiality and availability. While the security flaws in 802.11’s basic confidentially mechani ..."
Abstract - Cited by 258 (2 self) - Add to MetaCart
analysis of such 802.11-specific attacks – their practicality, their efficacy and potential low-overhead implementation changes to mitigate the underlying vulnerabilities. 1

Remote Timing Attacks are Practical

by David Brumley, Dan Boneh
"... Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running ..."
Abstract - Cited by 248 (4 self) - Add to MetaCart
Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running

The feasibility of launching and detecting jamming attacks in wireless networks

by Wenyuan Xu, Yanyong Zhang, Timothy Wood - In ACM MOBIHOC , 2005
"... Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitting radio frequency signals that do not follow an underlying MAC protocol. Jamming attacks can severely interfere with th ..."
Abstract - Cited by 265 (15 self) - Add to MetaCart
examine the critical issue of diagnosing the presence of jamming attacks. Specifically, we propose four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluate their effectiveness in terms of how

Integrated Circuit Evaluations Annex A: Examples for Smartcard Specific Attacks

by unknown authors , 2003
"... ..."
Abstract - Add to MetaCart
Abstract not found

Countering Code-Injection Attacks With Instruction-Set Randomization

by Gaurav S. Kc - In Proceedings of the ACM Computer and Communications Security (CCS) Conference , 2003
"... We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized instruction sets (e.g., machine instructions) of the system executing potentially vulnerable software. An attacker who does ..."
Abstract - Cited by 234 (26 self) - Add to MetaCart
We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized instruction sets (e.g., machine instructions) of the system executing potentially vulnerable software. An attacker who does
Next 10 →
Results 1 - 10 of 6,254
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University