• FOX

  • Referenced in 23 articles [sw13586]
  • discuss its security towards integral cryptanalysis, algebraic attacks, and other attacks...
  • SeLINQ

  • Referenced in 2 articles [sw28379]
  • root cause for confidentiality and integrity attacks against computing systems is insecure information flow ... studies database manipulation via an embedded language-integrated query language (with Microsoft’s LINQ...
  • Bel-T

  • Referenced in 1 article [sw29704]
  • Integral attacks on round-reduced Bel-T-256. Bel-T is the national block cipher ... cipher. In this paper, we present integral attacks against Bel-T-256 using the propagation ... property. Firstly, we propose two 2-round integral characteristics by employing a mixed integer linear ... function. Then, we utilize these integral characteristics to attack (3 rac{2}{7}) rounds...
  • EPCBC

  • Referenced in 6 articles [sw11640]
  • powerful attacks on AES. Related-key attacks are especially relevant when a block cipher ... resistance of EPCBC against integral cryptanalysis, statistical saturation attack, slide attack, algebraic attack...
  • FLASH

  • Referenced in 46 articles [sw02233]
  • proof of security, but the best known attacks require more than 2 80 computations ... NESSIE (New European Schemes for Signatures, Integrity, and Encryption), a project within the Information Societies...
  • CRAFT

  • Referenced in 2 articles [sw41024]
  • Attacks. Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after ... efficient protection against Side-Channel Analysis (SCA) attacks has been considered in their design ... implementations against Differential Fault Analysis (DFA) attacks has been one of the main design criteria ... side-channel protection, and their combination are integrated into the implementation. In addition to supporting...
  • AdJail

  • Referenced in 1 article [sw38010]
  • sensitive page content to confidentiality and integrity attacks launched by advertisements. In this paper...
  • MAWS

  • Referenced in 1 article [sw01354]
  • secured against confidentiality and integrity attacks during transport and suggests ways for protecting it from...
  • TrojanZoo

  • Referenced in 1 article [sw41284]
  • most defenses are ineffective against adaptive attacks, but integrating complementary ones significantly enhances defense robustness...
  • AIQL

  • Referenced in 1 article [sw39057]
  • Investigation Query Language (AIQL) that integrates critical primitives for attack investigation, and (3) an optimized...
  • DETER

  • Referenced in 4 articles [sw21081]
  • sophisticated cyber attacks and network design vulnerabilities. As devices become Internet integrated, the need...
  • VC3

  • Referenced in 4 articles [sw23078]
  • self-integrity invariants for all MapReduce code running within isolated regions, to prevent attacks ... base security guarantees, 4.5% with write integrity and 8% with read/write integrity...
  • RRE

  • Referenced in 9 articles [sw22305]
  • recovery engine. Preserving the availability and integrity of networked computing systems in the face ... player Stackelberg stochastic game. RRE applies attack-response trees to analyze undesired security events...
  • ReVirt

  • Referenced in 5 articles [sw29986]
  • have two problems: they depend on the integrity of the operating system being logged ... save sufficient information to replay and analyze attacks that include any non-deterministic events. ReVirt...
  • M-TREE

  • Referenced in 14 articles [sw02565]
  • immune to both physical and software attacks. Despite a number of secure processor designs have ... Authentication Code Tree (MACTree) for protecting applications’ integrity at a minimal performance overhead. M-TREE...
  • ATSyRa

  • Referenced in 0 articles [sw22309]
  • ATSyRa: An Integrated Environment for Synthesizing Attack Trees. Attack trees are widely considered...
  • VMGuard

  • Referenced in 1 article [sw31765]
  • cloud providers to protect the confidentiality and integrity of their applications and data. However ... running on the same host, an attack to the management virtual machine will easily lead ... this end, we propose VMGuard, an integrity monitoring and detecting system for management virtual machines ... monitor the co-resident management VMs. The integrity measurements collected by the Guard Domains...
  • DNSCurve

  • Referenced in 1 article [sw22847]
  • attacker who cares to look. DNSCurve encrypts all DNS packets. Integrity: DNS today uses ... create some speed bumps for blind attackers, but patient attackers and sniffing attackers can easily...
  • AESSE

  • Referenced in 1 article [sw37374]
  • cold boot attacks. More specifically, we implemented AES and integrated it into the Linux kernel...
  • Lintent

  • Referenced in 2 articles [sw21576]
  • effect system to statically prevent privilege escalation attacks on well-typed components. Drawing ... security type-checker for Android applications integrated with the Android Development Tools suite. We finally ... experiences with our tool, which highlight real attacks on existing applications...