Showing 41 - 60 results of 2,541 for search 'different attack', query time: 0.12s Refine Results
  1. 41
  2. 42

    Attack and protection schemes on fabric isomorphic crosschain systems by Zhuo Lv, Di Wu, Wen Yang, Li Duan

    Published 2022-01-01
    “…First, we analyze the vulnerabilities in different layers of Fabric isomorphic crosschain systems, and discuss the principles of different kinds of attacks. …”
    Get full text
    Article
  3. 43

    Differential fault attack on lightweight block cipher Klein by Yong-juan WANG, Quan-yu2 REN, Shi-yi ZHANG

    Published 2016-10-01
    “…As a lightweight block cipher algorithm based on SP structure,Klien has the characteristics of high efficiency and low energy consumption.By analyzing the S-boxes differential propagation path,it was found that under the condi-tion of same input and different difference,the intersection elements were unique,which fall in the intermediate state set corresponds to output difference,and a differential fault attack scheme was proposed.By injecting two different faults in the last round of the algorithm,all the keys of the Klein algorithm can be recovered,and the complexity is negligible.This method can be promoted to other block cipher algorithms based on SP structure and Feistel structure.…”
    Get full text
    Article
  4. 44

    Command Injection Attacks in Smart Grids: A Survey by Muhammad Usama, Muhammad Naveed Aman

    Published 2024-01-01
    “…Various techniques have been proposed in the literature to detect FCIAs on different components of smart grids. The predominant focus of current surveys lies on FCIAs and detection techniques for such attacks. …”
    Get full text
    Article
  5. 45

    Deterioration of service reservoirs due to soft water attack by Brueckner Rene, Griffiths Graham, Hesling Jed, Taylor Christopher, Telford Amber

    Published 2025-01-01
    “…Service reservoirs in the UK designed in accordance with EN 206 have shown deterioration due to soft water attack, which is a form of mild acid attack, within one year of commissioning. …”
    Get full text
    Article
  6. 46

    Attack signature generation by traceable dynamic taint analysis by Yu LIU, Mei-ning NIE, Pu-rui SU, Deng-guo FENG

    Published 2012-05-01
    “…Most of known attack signature generation systems took either black-box method or white-box method,both of which were limited in several aspects,such as costing a long time to capture sufficient samples,demanding arduous manual analysis and requiring source code of the vulnerable program.An attack signature generation method based on an innovative traceable dynamic taint analysis framework was proposed.By monitoring the vulnerable process execution,the executing trace and the constrain conditions exactly related to input data exploiting the vulnerability was extracted.Finally,by restoring the execution context and supplementing the determinant statements an executable Turing machine signature was attained.A prototype system was implemented and evaluated with different attack samples,which proved that the proposed method was able to generate accurate attack signature fast.…”
    Get full text
    Article
  7. 47

    Label flipping adversarial attack on graph neural network by Yiteng WU, Wei LIU, Hongtao YU

    Published 2021-09-01
    “…To expand the adversarial attack types of graph neural networks and fill the relevant research gaps, label flipping attack methods were proposed to evaluate the robustness of graph neural network aimed at label noise.The effectiveness mechanisms of adversarial attacks were summarized as three basic hypotheses, contradictory data hypothesis, parameter discrepancy hypothesis and identically distributed hypothesis.Based on the three hypotheses, label flipping attack models were established.Using the gradient oriented attack methods, it was theoretically proved that attack gradients based on the parameter discrepancy hypothesis were the same as gradients of identically distributed hypothesis, and the equivalence between two attack methods was established.Advantages and disadvantages of proposed models based on different hypotheses were compared and analyzed by experiments.Extensive experimental results verify the effectiveness of the proposed attack models.…”
    Get full text
    Article
  8. 48

    Attack traffic allocation and load balancing mechanism for SDN by LI Man, ZHOU Huachun, XU Qi, DENG Shuangxing, ZOU Tao, ZHANG Ruyun

    Published 2025-03-01
    “…To tackle the problem of traditional traffic allocation methods in software-defined networks (SDN) potentially failing to effectively detect distributed denial of service (DDoS) attacks, a traffic allocation and load balancing mechanism for attack traffic was proposed. …”
    Get full text
    Article
  9. 49

    Power analysis attack of HMAC based on SM3 by Zhi-bo DU, Zhen WU, Min WANG, Jin-tao RAO

    Published 2016-05-01
    “…The current power analysis attack of HMAC based on SM3 applies only to the object,on which there is the Hamming weight and Hamming distance information leakage at the same time.there is only a single information leakage mode on the attack object,then the attack methods don't work.To solve the limitations of the current attack methods,a novel method of the power analysis attack of HMAC based on SM3 was proposed.The different attack object and their related va-riables were selected in each power analysis attack.The attacks were implemented according to the Hamming distance mod-el or Hamming weight model of the intermediate variables.After several power analysis attacked on the first four rounds of SM3,the equations that consists of the results proposed of all the power analysis attacks were obtained.The ultimate attack object is derived by getting the solution of the equations.The experimental results show that the oposed attack method was effective.The method can be used universally because its being available for both the situation of co-exist of hamming weight with Hamming distance,and that of either the Hamming weight or choosing the Hamming distance model existence.…”
    Get full text
    Article
  10. 50

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article
  11. 51

    GenAI-Based Jamming and Spoofing Attacks on UAVs by Burcu Sonmez Sarikaya, Serif Bahtiyar

    Published 2025-01-01
    “…Uncrewed Aerial Vehicles (UAVs) operate on various environments with different technologies that are subject to many attacks. …”
    Get full text
    Article
  12. 52

    Review of Research on Adversarial Attack in Three Kinds of Images by XU Yuhui, PAN Zhisong, XU Kun

    Published 2024-12-01
    “…As a result, adversarial attack has been a hot research area. Since deep neural networks are widely used in image tasks, research on adversarial attacks in the image field is a key to enhancing security, and a lot of research from different perspectives has been carried out. …”
    Get full text
    Article
  13. 53

    Adversarial Attacks to Manipulate Target Localization of Object Detector by Kai Xu, Xiao Cheng, Ji Qiao, Jia-Teng Li, Kai-Xuan Ji, Jia-Yong Zhong, Peng Tian, Jian-Xun Mi

    Published 2024-01-01
    “…We discover that, for a certain target in the input image, the areas concerned by the classification and localization of the object detection model are determined but different. Therefore, we propose a local perturbation based adversarial attack method for object detection localization, which identifies key areas affecting target localization and adds adversarial perturbations to these areas to achieve bounding box attacks on target bounding box localization while ensuring high stealthiness. …”
    Get full text
    Article
  14. 54

    Vegetative status in patients with transient ischemic attack and stroke by N. V. Halinouskaya, S. V. Samsonau

    Published 2018-06-01
    “…One group consists of patients with transient ischemic attack (TIA) and another group consists of patients with stroke. …”
    Get full text
    Article
  15. 55

    First Attack of Acute Urticaria in Pediatric Emergency Department by Tzu-Hsuan Liu, Yan-Ren Lin, Kuo-Chia Yang, Chu-Chung Chou, Yu-Jun Chang, Han-Ping Wu

    Published 2008-06-01
    “…Patient demographics and detailed etiologies of the first attack of acute urticaria were analyzed. Furthermore, the prevalence of various etiologies in different age groups, as well as the etiologic trends of acute urticaria in children during the previous 7 years, was determined. …”
    Get full text
    Article
  16. 56

    Controlling user access with scripting to mitigate cyber-attacks by Owusu Nyarko-Boateng, Isaac Kofi Nti, Anastasia Akyamaa Mensah, Emmanuel Kojo Gyamfi

    Published 2024-12-01
    “…This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. …”
    Get full text
    Article
  17. 57

    Panic attack symptoms in patients with diabetic peripheral neuropathy by Nayden H. Manolov, Arman Sh Postadzhiyan, Sonya M. Karabeliova, Peter M. Marinov

    Published 2025-05-01
    “…The results indicated significant differences between the two study groups(t[127.513] = 3.293; p < 0.01), and patients with DPN had a higher prevalence of panic attack symptoms than those in the control group.Furthermore, significant differences were observed in the severity of panic attack symptoms within the DPN group (t[(81] = 2.017, p < 0.05).Patients who had experienced DPN for more than one year reported more severe symptoms than those who had experienced it for less than oneyear. …”
    Get full text
    Article
  18. 58

    Vulnerability Assessment of Hazmat Storage Tanks to Shooting Attacks by Matteo Iaiani, Alessandro Tugnoli, Valerio Cozzani

    Published 2025-06-01
    “…There is historical evidence of chemical and process facilities being the target of shooting attacks. A fundamental step in security risk assessment is the analysis of the vulnerability of the target installation against the physical effects of the attacks. …”
    Get full text
    Article
  19. 59

    Blind mask template attacks on masked cryptographic algorithm by Yi WANG, Zhen WU, Bing LIN

    Published 2019-01-01
    “…Masking is a countermeasure against differential power analysis (DPA) attacks on cryptographic devices by using random masks to randomize the leaked power of sensitive information.Template attacks (TA) against cryptographic devices with masking countermeasure by far require attackers have knowledge of masks at the profiling phase.This requirement not only increase the prerequisite of template attacking,but also lead to some sort of difference between the experimental encryption codes of the profiling device and the codes of commercial cryptographic devices,which might degrade performance in real world attacking.Blind mask template attack directly learns templates for the combination of no mask intermediate values without the need of knowing the masks of training power traces,and then uses these templates to attack masked cryptographic devices.Both traditional Gaussian distribution and neural network were adopted as the templates in experiments.Experimental results verified the feasibility of this new approach.The success rate of neural network based blind mask template attacking against masked cryptographic devices is very close to that of traditional template attacks against cryptographic devices without masking countermeasure.…”
    Get full text
    Article
  20. 60