Showing 1,361 - 1,380 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1361

    Constructing method of opaque predicate based on type conversion and operation of floating point numbers by Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE

    Published 2023-10-01
    “…With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry research.Code obfuscation is a common software protection technique used to hinder reverse engineering.It aims to make program analyzing and understanding more difficult for attackers while preserving the original program functionality.However, many existing code obfuscation techniques suffer from performance loss and poor concealment in pursuit of obfuscation effectiveness.Control flow obfuscation, particularly opaque predicate obfuscation, is widely used to increase the difficulty of code reverse engineering by disrupting the program’s control flow.A method was proposed to address the limitations of existing code obfuscation techniques.It utilized the phenomenon of precision loss that occurred during type conversion and floating-point number operations in computers.Under certain conditions, this method produced operation results that contradict common sense.By performing forced type conversion, addition, and multiplication with selected decimal numbers, a series of opaque predicates can be constructed based on the statistical analysis of their operation results.This approach achieved code obfuscation with high concealment, good generality, reversibility, and low overhead compared to traditional opaque predicates.Experimental verification demonstrates that this method significantly slows down attackers’ reverse engineering efforts and exhibits good resistance to dynamic analysis techniques such as symbolic execution.…”
    Get full text
    Article
  2. 1362

    Rotation Correction Algorithm Based on Polar Harmonic Fourier Moments and Optimization of Color Image Security Quantization Watermarking Scheme by Yuli Yang, Meiru Jiang, Xiufang Feng, Chenchen Lu, Yongle Chen, Shuang Zhou, Hao Zhang

    Published 2024-01-01
    “…With this enhancement, the robustness of color image watermarking algorithms against geometric attacks has taken a significant leap forward, the normalized correlation coefficient of quantization watermarking algorithm, which could not resist rotation attack, is now stable above 0.9. …”
    Get full text
    Article
  3. 1363

    Efficiency Simultaneous key Exchange-Cryptography Extraction from Public key in Fog-Cloud Federation-Based Secure Offloading for Automatic Weather Stations Observing Systems by Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali

    Published 2023-03-01
    “…At any moment, there is a possibility that a third party with an identity attack can be placed between AWS and CPS and listen to or manipulate the data sent. …”
    Get full text
    Article
  4. 1364

    New remote authorization protocol for vehicle diagnosis by Zheng-da JIAO, Jian-feng MA, Cong SUN, Qing-song YAO

    Published 2014-11-01
    “…The authorization of diagnosis principals is a critical problem in the remote fault diagnosis of vehicles.Considering the defects of the previous authorization protocol for the remote diagnosis,i.e.PVAUDS,a novel authorization protocol is proposed,named PVAUDS+.In addition to the enforcement on the security properties of PVAUDS,the bidirectional authentication and the freshness of authorization tickets for the diagnosis principals are provided.The resistance of Denial-of-Service (DoS) attack for the trusted third party is also provided.The proposed security targets are achieved through the cost increasing of requests for the resistance of DoS attack,the automatic proof of security properties with the ProVerif tool.The results of quantitative analysis show proposed protocol is practical for use.…”
    Get full text
    Article
  5. 1365

    Smart Approach for Botnet Detection Based on Network Traffic Analysis by Alaa Obeidat, Rola Yaqbeh

    Published 2022-01-01
    “…Today, botnets are the most common threat on the Internet and are used as the main attack vector against individuals and businesses. …”
    Get full text
    Article
  6. 1366

    Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud by Chongxia Wang, Meizhen Gao, Qian Liu, Xianwei Zhou

    Published 2014-04-01
    “…The theoretical analysis and experiment results show that the proposed protocol is safe and efficient, which can effectively prevent data tampering, identity forging, replay attacks and man-in-the-middle attacks. Else the proposed protocol provides a practical solution on identity authentication and key agreement in hybrid clouds with less computation and communication overheads.…”
    Get full text
    Article
  7. 1367

    Public key searchable encryption scheme based on blockchain by Ruizhong DU, Ailun TAN, Junfeng TIAN

    Published 2020-04-01
    “…Aiming at the trapdoor security problem of the public key encryption scheme,a random number constructing trapdoor and index was introduced to defend against keyword guessing attacks from the server and avoid data leakage caused by server curious behavior.Research on trusted issues of third parties,the blockchain mechanism with a searchable encryption scheme was combined,and smart contracts as trusted third parties for retrieval was used,which could prevent keyword guessing attacks inside the server and ensure retrieval.The correctness of the results,thereby limiting the malicious behavior of the server when sending data.The solution was analyzed for security and the verification scheme satisfies IND-KGA security.Experiments in real data sets,compared with other programs,prove that the program has certain advantages in time overhead.…”
    Get full text
    Article
  8. 1368

    Cloud data anonymous assured deletion approach based on blockchain by Shuangxing WANG, Jintang LUO, Lisha SHUAI, Jiamin ZHANG, Min ZHANG, Xiaolong YANG

    Published 2021-03-01
    “…The previous assured deletion schemes ignored that the privacy is threated by the relevance between data and user identity, exposing user behavior to the cloud service provider or attackers.Aiming at the above problems, an assured deletion approach based on blockchain was proposed.The improved linkable ring signature scheme was adopted to make user achieve anonymous assured deletion by setting specific link symbol in the signature.Moreover, the blockchain technology was leveraged to guarantee the nonrepudiation of assured deletion.Theoretical analysis and experimental results show that the proposed approach can meet the assured deletion requirements of user data in cloud storage, and its anonymity can effectively prevent attackers from tracking and analyzing user behavior.…”
    Get full text
    Article
  9. 1369

    Improved identity based multi-receiver anonymous signcryption scheme by Bo ZHANG, Tao SUN, Dai-rong YU

    Published 2015-09-01
    “…Recently,Pang,et al proposed a novel identity based multi-receiver anonymous signcryption scheme (IBMRASC),which put into consideration both the sender's anonymity and the receiver's anonymity simultaneously.However,the analysis with respect to this scheme indicated that,under existing security models the adversary can distin-guish the ciphertexts associated with different plaintexts.Therefore,Pang's approach did not satisfy the requirement of indistinguishability against chosen ciphertext attacks (CCA).An improved scheme which is selective identity secure in the random oracle model was proposed.Under the CDH and Gap-BDH hard problem assumption,the improved scheme is both existentially unforgetable against chosen message attack and indistinguishable against adaptive CCA.…”
    Get full text
    Article
  10. 1370

    Mimic storage scheme based on regenerated code by Yue CHEN, Longjiang WANG, Xincheng YAN, Xinyue ZHANG

    Published 2018-04-01
    “…Aiming to solve security threats in the cloud storage system due to static storage architecture and storage mode,a mimic storage scheme based on regenerated code was proposed.The scheme used network coding scheme to store the data in the cloud data node,and used mimicry transformation mechanism based on regeneration code to change data storage state dynamically according to the random time-varying factors,which could guarantee data integrity and data availability continuously.The mimicry transformation mechanism is a random,time-varying and dynamic scheme,which increases the uncertainty of storage system.It blocks and interferes with the attack chain,increases the difficulty and cost of the attack operation,and improves the security and reliability of the system.…”
    Get full text
    Article
  11. 1371

    An ownership transfer protocol for wearable devices by Shun HU, Jian WENG, Jia-nan LIU

    Published 2015-12-01
    “…Recently,wearable devices acted as a kind of smart devices are changing people’s life style.When these devices are used in multi-user setting,ownership transfer should usually be considered.To resolve the security and privacy problems introduced in the ownership transfer process of wearable devices,a secure ownership transfer pro-tocol including initialization,mutual authentication and key change for wearable devices was introduced.The secu-rity analysis indicates that the proposed protocol can resist either normal channel attacks or special attacks appeared in the ownership transfer scenarios.The experiment results indicate that the proposed scheme is fairy efficient and is quite suitable for wearable devices.…”
    Get full text
    Article
  12. 1372

    Urban Terrorism: St. Peter’s Square, Vatican City by Daniel Tan

    Published 2017-02-01
    “…In the wake of the 2015 Paris attacks that claimed 130 lives, and in response to FBI warnings about threats by the Islamic State terrorist group, stringent security measures were pre-emptively imposed on St. …”
    Get full text
    Article
  13. 1373

    Method for router online security risk assessment quantification by Jun-gang YANG, Li LIANG, Gu-jing LIU, Qian ZHANG, Chang-qing ZHANG

    Published 2013-11-01
    “…The concept of router safety performance was proposed based on the nature of router security issues and router attacks were classified. Then a method for router online security risk assessment quantification was also presented.The security risk factor of service decline was calculated by router bandwidth consumption and average CPU usage and the security risk factor of privilege escalation was calcu ated by the possibility of threat occurrence and severity based on the router attack classification. …”
    Get full text
    Article
  14. 1374

    Structural properties and static robustness of Linux software network by Ershen WANG, Yu LI, Chen HONG, Qinghua SUN, Chang LIU

    Published 2019-11-01
    “…The source code of the Linux software was analyzed,and the directed function call network model,the weak coupling network model of software system,the strong coupling network model and the strong connected subgraph model were built.The characteristics and static robustness of the four networks were studied.The results show that four networks all show ‘small-world’ property.The out-degree distribution of the six modules in the Linux network generally follows the exponential distribution,and the in-degree distribution of the six modules follows the power law.The best attacking strategy was distinct when different robustness evaluation indicator was adopted.For the weak connectivity indicator,high in-degree attacking strategy was of the greatest damage to the weakly coupled software network.…”
    Get full text
    Article
  15. 1375

    Research on alert correlation method based on alert confidence in multi-IDS environment by MEI Hai-bin, GONG Jian

    Published 2011-01-01
    “…To overcome the shortcoming of current alert correlation methods which didn’t consider the confidence of IDS,an alert correlation method based on alerts confidence using the evidence theory was presented.Each alert was regarded as a piece of evidence of a network attack.Then multiple pieces of evidence were combined by the Dempster’s combina-tion rule,and used to infer whether the attack corresponding to the alerts took place.As a result,the ambiguity and con-fliction in alerts were eliminated,achieving the goal of improving alerts quality.Experimental results on the DARPA 2000 IDS test dataset show that the proposed method can efficiently decrease the false alert rate and reduce more than 60% of the alerts.…”
    Get full text
    Article
  16. 1376

    Analysis and improvement of an identity-based signature scheme from lattices by ANGChun-li Y, ANJian-hua Y, HENGShi-hui Z, ANGLi-cheng W, ANGYu Y

    Published 2015-05-01
    “…Liu et al proposed an identity-based signature from lattices in 2013,and proved that it can achieve strong un-forgeability in the standard model.Through analysis,the security proof of this scheme has some defect,and then show that the scheme cannot prove the strong unforgeability under selective identity and adaptive chosen-message attacks.Then,using Boyen signing technique (PKC 2010) inpoves the signing algorithm,and proves the strong unforgeability under selective identity and adaptive chosen-message attacks (SU-sID-CMA) in the standard model.In addition,it com-pares the efficiency and security of the scheme and the other identity-based signatures from lattices.…”
    Get full text
    Article
  17. 1377

    An intrusion detection model based on convolution neural network for Internet of vehicles by ZHANG Rui

    Published 2024-12-01
    “…In order to improve the accuracy of detecting the cyber-attacks in Internet of vehicles, hyper-parameter optimization convolution neural network-based ensemble Intrusion detection system (CNES) was proposed. …”
    Get full text
    Article
  18. 1378

    Automated intrusion response system model based on danger theory by Ling-xi PENG, Dong-qing XIE, Ying-fang FU, Wei XIONG, Yu-li SHEN

    Published 2012-01-01
    “…A novel automated response system model based on the danger theory (AIRSDT) was given.With the descriptions of self,non-self,immunocyte,memory detector,mature detector and immature detector of the network transactions,network danger evaluation equations for host and network were built up.Then,the automated response actions were taken or adjusted according to the danger of each network attack,including holistic risk degrees of the host and network.Both the theory analysis and experimental results prove that AIRSDT not only helps to solve the problem that the current automated response models could not detect the ‘true’ intrusion or attack action,but also greatly reduces the response times and response cost.…”
    Get full text
    Article
  19. 1379

    A Novel Image Encryption Algorithm Based on DNA Subsequence Operation by Qiang Zhang, Xianglian Xue, Xiaopeng Wei

    Published 2012-01-01
    “…The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.…”
    Get full text
    Article
  20. 1380

    AN APPROACH HYBRID RECURRENT NEURAL NETWORK AND RULE-BASE FOR INTRUSION DETECTION SYSTEM by Trần Thị Hương, Phạm Văn Hạnh

    Published 2019-06-01
    “…The rule set is capable of detecting known attacks, while the recurrent neural network has the advantage of detecting new attacks. …”
    Get full text
    Article