Zobrazeno 1 - 10
of 56
pro vyhledávání: '"Ochoa, Martin"'
Digital authentication is a mature field, offering a range of solutions with rigorous mathematical guarantees. Nevertheless, paper documents, where cryptographic techniques are not directly applicable, are still widely utilized due to usability and l
Externí odkaz:
http://arxiv.org/abs/2210.07884
Traditionally, applications that are used in large and small enterprises were deployed on "bare metal" servers installed with operating systems. Recently, the use of multiple virtual machines (VMs) on the same physical server was adopted due to cost
Externí odkaz:
http://arxiv.org/abs/2111.11475
Neural network implementations are known to be vulnerable to physical attack vectors such as fault injection attacks. As of now, these attacks were only utilized during the inference phase with the intention to cause a misclassification. In this work
Externí odkaz:
http://arxiv.org/abs/2109.11249
Programmable Logic Controllers (PLCs) are a core component of an Industrial Control System (ICS). However, if a PLC is compromised or the commands sent across a network from the PLCs are spoofed, consequences could be catastrophic. In this work, a no
Externí odkaz:
http://arxiv.org/abs/2102.08985
Cyber-Physical Systems (CPS) are being widely adopted in critical infrastructures, such as smart grids, nuclear plants, water systems, transportation systems, manufacturing and healthcare services, among others. However, the increasing prevalence of
Externí odkaz:
http://arxiv.org/abs/2012.12529
Publikováno v:
In Computers & Security May 2023 128
Autor:
Chekole, Eyasu Getahun, Cheramangalath, Unnikrishnan, Chattopadhyay, Sudipta, Ochoa, Martin, Huaqun, Guo
Memory-safety attacks have been one of the most critical threats against computing systems. Although a wide-range of defense techniques have been developed against these attacks, the existing mitigation strategies have several limitations. In particu
Externí odkaz:
http://arxiv.org/abs/1809.07477
Autor:
Homoliak, Ivan, Teknos, Martin, Ochoa, Martín, Breitenbacher, Dominik, Hosseini, Saeid, Hanacek, Petr
Publikováno v:
EAI Endorsed Transactions on Security and Safety: Volume 5 (2018), Issue 17
Machine-learning based intrusion detection classifiers are able to detect unknown attacks, but at the same time, they may be susceptible to evasion by obfuscation techniques. An adversary intruder which possesses a crucial knowledge about a protectio
Externí odkaz:
http://arxiv.org/abs/1805.02684
Publikováno v:
ACM Computing Surveys (CSUR). Vol. 52 (2019), Issue 2
Insider threats are one of today's most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. Despite several scientific works published in this domain, we argue that the field can benefit from the prop
Externí odkaz:
http://arxiv.org/abs/1805.01612
In recent years fingerprinting of various physical and logical devices has been proposed with the goal of uniquely identifying users or devices of mainstream IT systems such as PCs, Laptops and smart phones. On the other hand, the application of such
Externí odkaz:
http://arxiv.org/abs/1712.01598