Zobrazeno 1 - 10
of 454
pro vyhledávání: '"Keromytis, Angelos"'
We introduce a new class of hardware trojans called interrupt-resilient trojans (IRTs). Our work is motivated by the observation that hardware trojan attacks on CPUs, even under favorable attack scenarios (e.g., an attacker with local system access),
Externí odkaz:
http://arxiv.org/abs/2403.10659
Social networking services have attracted millions of users, including individuals, professionals, and companies, that upload massive amounts of content, such as text, pictures, and video, every day. Content creators retain the intellectual property
Externí odkaz:
http://arxiv.org/abs/1810.04779
Autor:
Petsios, Theofilos, Tang, Adrian, Mitropoulos, Dimitris, Stolfo, Salvatore, Keromytis, Angelos D., Jana, Suman
Modern applications and Operating Systems vary greatly with respect to how they register and identify different types of content. These discrepancies lead to exploits and inconsistencies in user experience. In this paper, we highlight the issues aris
Externí odkaz:
http://arxiv.org/abs/1708.09334
Algorithmic complexity vulnerabilities occur when the worst-case time/space complexity of an application is significantly higher than the respective average case for particular user-controlled inputs. When such conditions are met, an attacker can lau
Externí odkaz:
http://arxiv.org/abs/1708.08437
We present the first micro-architectural side-channel attack which runs entirely in the browser. In contrast to other works in this genre, this attack does not require the attacker to install any software on the victim's machine -- to facilitate the
Externí odkaz:
http://arxiv.org/abs/1502.07373
New applications for the Internet such as video on demand, grid computing etc. depend on the availability of high bandwidth connections with acceptable Quality of Service (QoS). There appears to be, therefore, a requirement for a market where bandwid
Externí odkaz:
http://arxiv.org/abs/cs/0504007
Publikováno v:
In Computer Communications 15 February 2015 57:50-63
Publikováno v:
Internet Research, 2003, Vol. 13, Issue 2, pp. 107-115.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/10662240310469763
Autor:
Stavrou, Angelos, Cook, Debra L., Morein, William G., Keromytis, Angelos D., Misra, Vishal, Rubenstein, Dan
Publikováno v:
In Computer Networks 2005 48(5):781-807
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.