Showing 1,881 - 1,900 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 1881

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  2. 1882

    Design of a Solar Dryer for Tomatoes. by Bwire, Samlex Sibagaya

    Published 2025
    “…However, various issues arise in such processes, such as bird, insect, or other animal attacks, fungal attacks, unexpected changes in weather, low or prolonged exposure to the sun, dust mixing, and so on. …”
    Get full text
    Thesis
  3. 1883

    A security authentication scheme in RFID system for smart park by Rongrong LI, Jiantao KOU, Gang DONG, Liangrui TANG

    Published 2016-02-01
    “…The new protocol could effectively resist attacks of re-transmission,tracking,deception,cloning and de-synchronizationand,and it had high security and practicability.…”
    Get full text
    Article
  4. 1884

    Life Cycle of the Lesser Cornstalk Borer in Sugarcane by Hardev S. Sandhu, Leslie E. Baucum, Gregg S. Nuessly

    Published 2011-10-01
    “…The lesser cornstalk borer attacks a large number of crops but is a potentially serious pest of sugarcane. …”
    Get full text
    Article
  5. 1885

    A Coconut Mite, Aceria guerreronis Keifer (Arachnida: Acari: Eriophyidae) by F. W. Howard, Dave Moore

    Published 2007-03-01
    “…Howard and Dave Moore, describes one of the worst arthropod pests of coconut palms, which attacks the young fruits and can cause scarring and distortion and premature fruit drop.  …”
    Get full text
    Article
  6. 1886

    Survey on research of mini-drones security by Wei LIU, Bing-wen FENG, Jian WENG

    Published 2016-03-01
    “…The research status of mini-drones, including the security threats of mini drones, the security attacks from mini drones, the authentication and traceability of mini drones, etc were introduced and analyzed. …”
    Get full text
    Article
  7. 1887

    Cardiac Fibroelastoma: A Rare Cause of Stroke in Young Adults by Ahmad Mirdamadi, Mohsen MirmohammadSadeghi, Mahfar Arasteh, Mojgan Gharipour

    Published 2013-01-01
    “…A 26-year-old man presenting with a transient episode of dysarthria and dizziness, 3 weeks prior to admission, was referred to our center to be evaluated for transient ischemic attack (TIA). The patient had been previously admitted to a different hospital and echocardiography was reported normal at that center, but upon presenting to our institution strand-like masses in the left ventricle (LV) were detected. …”
    Get full text
    Article
  8. 1888

    La mise au tombeau peinte par Antoine de Lonhy dans la cathédrale Saint-Jean-Baptiste à Saint-Jean-de-Maurienne by Séverine Haberer

    Published 2021-03-01
    “…Between 2013 and 2014, it was restored and protected after salt marks appeared at the base of the painting, attacking the colored layer. This mural was discovered by chance in the 1960s, it had been moved at some stage, but never analyzed technically. …”
    Get full text
    Article
  9. 1889

    Hawthorn Lace Bug, Corythucha cydoniae (Fitch) (Insecta: Hemiptera: Tingidae) by Frank W. Mead

    Published 2002-08-01
    “… The hawthorn lace bug, Corythucha cydoniae (Fitch), selectively attacks a variety of woody, rosaceous plants and can cause severe leaf damage. …”
    Get full text
    Article
  10. 1890

    Le poète, le cardinal et l’ange du foyer by Jacqueline Clais

    Published 2011-03-01
    “…In 1881 cardinal Manning who supports the Irish farmers in their struggle for more justice is the butt of all sorts of attacks on the part of the protestant but also the catholic landed gentry. …”
    Get full text
    Article
  11. 1891

    Hawthorn Lace Bug, Corythucha cydoniae (Fitch) (Insecta: Hemiptera: Tingidae) by Frank W. Mead

    Published 2002-08-01
    “… The hawthorn lace bug, Corythucha cydoniae (Fitch), selectively attacks a variety of woody, rosaceous plants and can cause severe leaf damage. …”
    Get full text
    Article
  12. 1892

    Linear complexity of two classes of optimal sets frequency-hopping sequences by Jun-tao GAO, Yu-pu HU, Xue-lian LI, Shang-rong XIANG

    Published 2012-02-01
    “…By using a type of permutation polynomials which were different from power permutations,the two classes of frequency-hopping sequence sets with low linear complexity was transformed into the ones with high linear complexity.The exact values of linear complexity of these sequences were given by applying the theoretical proof.The results show that the two new classes of frequency-hopping sequences sets not only have optimal Hamming correlation,but also have larger linear span and can resist the Berlekamp-Massey attack compared with the two primary classes of frequency-hopping sequence sets.…”
    Get full text
    Article
  13. 1893

    Cartoon Image Encryption Algorithm by a Fractional-Order Memristive Hyperchaos by Shu-ying Wang, Jian-feng Zhao, Xiao-yan Wang, Li-tao Zhang

    Published 2019-01-01
    “…Security and performance analysis indicates that the proposed chaos-based image encryption algorithm is highly resistant to statistical attacks.…”
    Get full text
    Article
  14. 1894

    Research of Fragment Mechanism Security in IPv6 Network Protocol by Xianglin Wang, Chen Zhu, Dongmei Sun, Mingyue Li, Qingzi Shen

    Published 2013-10-01
    “…Based on open source Snort platform,the packet block mechanism in IPv6 network was discussed.The behavior using IPv6 packet fragment to attack network was studied.Against to the problems,such as too little for IPv6 packet segment,overlapping section and so on,it put forward the corresponding countermeasures.The intrusion detection system were designed and implemented for piecewise leak testing.The experiments show that the design of intrusion detection system can detect the abnormal IPv6 packet,and Snort to support for IPv6 function was improved and optimized.…”
    Get full text
    Article
  15. 1895

    Citrus Diseases Exotic to Florida: Huanglongbing (Citrus Greening) by Kuang-Ren Chung, R. H. Briansky

    Published 2005-07-01
    “…Economic losses due to plant diseases can be severe, but fortunately, not all pathogens attacking citrus are present in Florida. There are other serious, exotic pathogens that have not been introduced into Florida. …”
    Get full text
    Article
  16. 1896

    Generalization and improvement of Nyberg-Rueppel message recovery blind signatures by HUANG Zhen-jie1, WANG Yu-min2, CHEN Ke-fei1

    Published 2005-01-01
    “…A generalized Nyberg-Rueppel message recovery blind signature scheme was presented,from which the scheme proposed by Camenisch et al and two new schemes could be obtained.One of these two new schemes was an efficiently improved scheme without computing any inverse while Camenisch et al’s scheme needs.Moreover,using the padding technique and hash function,a provably secure message recovery blind signature scheme,against adaptive chosen-message attack in random oracle model and generic group model,was proposed.…”
    Get full text
    Article
  17. 1897

    Acetabular Central Fracture Dislocation after Generalized Seizure during Lumbar Myelography with Iohexol by Kyung-Soon Park, Jae-Young Moon, Chang-Seon Oh, Taek-Rim Yoon

    Published 2013-01-01
    “…Therefore, we report a case of unilateral acetabular central fracture dislocation after a seizure episode, with relevant literature review. The seizure attack occurred after contrast media (Iohexol) injection for checking the myelography.…”
    Get full text
    Article
  18. 1898

    Mobile RFID system authentication protocol based on one-way pseudo random function by Biyuan JIAN, Daowei LIU

    Published 2017-06-01
    “…Aiming at the cost,efficiency and security of mobile RFID system authentication,a mobile RFID authentication protocol based on one-way pseudo random function was designed.The protocol reduced system cost by making full use of the three party of the shared key and communication information to encrypt transmission and authentication.Through the implementation of three party authentication and key update work,the agreement suffered counterfeit,desynchronization and other attacks was avoided.Finally,the logical proof of GNY and its security and performance analysis were gived to show the feasibility and security of the new protocol.…”
    Get full text
    Article
  19. 1899

    Citrus Diseases Exotic to Florida: Huanglongbing (Citrus Greening) by Kuang-Ren Chung, R. H. Briansky

    Published 2005-07-01
    “…Economic losses due to plant diseases can be severe, but fortunately, not all pathogens attacking citrus are present in Florida. There are other serious, exotic pathogens that have not been introduced into Florida. …”
    Get full text
    Article
  20. 1900

    Software services protection security protocol based on software watermarking in cloud environment by Jin-chao XU, Guo-sun ZENG, Wei WANG

    Published 2012-11-01
    “…Aimed to resist the infringement of software services in cloud environment,a software services protection security protocol based on software watermarking in cloud environment was presented.On the consideration of actual needs in cloud computing,the protocol introduced the software watermarking as a service cloud which was responsible for software watermark embedding and extraction.The protocol not only met the basic requirements of software copyright protection,but also gived the detailed strategy to solve the infringement,and hardened the ability of the software watermarking to resist various attacks.The analysis shows that the proposed protocol has higher security.…”
    Get full text
    Article