-
61
Practical Opcode-based Fault Attack on AES-NI
Published 2025-06-01“…By analyzing the opcodes of AES-NI, we identify six pairs of instructions with only a single-bit difference, making them susceptible to bit-flip-type attacks. …”
Get full text
Article -
62
Probabilistic characteristics analysis of virus attack effect on digital substations
Published 2025-02-01“…Security technologies consider different maintenance personnel operation modes to ensure customer fulfillment requirements for safe information processing probability and the case of deliberate attacks on digital substations in each period.Conclusions. …”
Get full text
Article -
63
Re-Evaluating Deep Learning Attacks and Defenses in Cybersecurity Systems
Published 2024-12-01“…Among different attacks, generative adversarial networks (GANs) have been known as one of the most powerful threats to cybersecurity systems. …”
Get full text
Article -
64
Equilibrium analysis of block withholding attack: an evolutionary game perspective
Published 2022-12-01“…Due to the permissionless environment, the blockchain is vulnerable to different kinds of attacks, including the block withholding (BWH) attack. …”
Get full text
Article -
65
On Power-Off Temperature Attacks Potential Against Security Sensors
Published 2025-03-01“…Although numerous security sensors and attack detectors have been proposed in the literature to detect different sources of FIAs, it is crucial to ensure that these mechanisms themselves have not been tampered. …”
Get full text
Article -
66
Unveiling the Efficacy of AI-based Algorithms in Phishing Attack Detection
Published 2024-06-01“…Moreover, the paper shows how different AI techniques have been employed in multiple studies to detect and address phishing attacks. …”
Get full text
Article -
67
Hybrid quantum enhanced federated learning for cyber attack detection
Published 2024-12-01“…Abstract Cyber-attack brings significant threat and become a critical issue in the digital world network security. …”
Get full text
Article -
68
Inferring influenza infection attack rate from seroprevalence data.
Published 2014-04-01“…Seroprevalence survey is the most practical method for accurately estimating infection attack rate (IAR) in an epidemic such as influenza. …”
Get full text
Article -
69
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01“…Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.…”
Get full text
Article -
70
Analysis of DoS attacks on Docker inter-component stdio copy
Published 2020-12-01“…In recent years,Docker has been widely deployed due to its flexibility and high scalability.However,its modular design leads to the DoS attacks on inter-component communication.A new DoS attack that outputs to stdout,causing high CPU usages among different Docker components.Analysis shows that the stdout output triggers the goroutines of Docker components.To find all goroutines setup paths,using the static analysis method to analyze the Docker components systematically was proposed.A static analysis framework was designed and implemented,and evaluated on Docker source code.The results show that static analysis framework finds 34 paths successfully,while 22 of them are confirmed by runtime verification.…”
Get full text
Article -
71
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01“…In particular, this attack could also be used to iSCREAM algorithm. Different to the best known attacks, the new attack requires less time and data complexities. …”
Get full text
Article -
72
Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection
Published 2015-01-01“…An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. …”
Get full text
Article -
73
Traffic Rerouting Strategy against Jamming Attacks in WSNs for Microgrid
Published 2012-04-01“…We determine disjoint multiple paths as candidates of a detour path and then select the detour path among the candidates in order to reduce the effect of jamming attack and distribute traffic flows on different detour paths. …”
Get full text
Article -
74
The Dangerous Effects of a Frustratingly Easy LLMs Jailbreak Attack
Published 2025-01-01“…In particular, the vulnerabilities exposed by such attacks appear to be generalizable across different LLMs and languages. …”
Get full text
Article -
75
Dual-verification-based model fingerprints against ambiguity attacks
Published 2024-12-01“…However, there is a concern regarding the vulnerability of previous model fingerprints to “ambiguity attacks,” where attackers may use fabricated fingerprints to bypass ownership verification, potentially leading to disputes. …”
Get full text
Article -
76
LDoS attack detection method based on traffic classification prediction
Published 2022-03-01“…The experimental results show that the global LDoS attack traffic detection method based on the Hurst index and GBDT algorithm achieves better detection results under different attack rates.…”
Get full text
Article -
77
Mitigating opinion polarization in social networks using adversarial attacks
Published 2025-03-01“…Recently, it was found that even a few artificial perturbations inspired by the adversarial attack reverse the result in voter models, where a minority opinion becomes dominant through these perturbations. …”
Get full text
Article -
78
ProvNavigator: shadow path guided attack investigation method
Published 2025-04-01“…After cyber attacks, conducting an investigation to analyze its root cause and impact is crucial. …”
Get full text
Article -
79
Task Allocation and Saturation Attack Approach for Unmanned Underwater Vehicles
Published 2025-02-01“…In modern marine warfare, unmanned underwater vehicles (UUVs) have fast and efficient attack capabilities. However, existing research on UUV attack strategies is relatively limited, often ignoring the requirement for the effective allocation of different strategic value areas, which restricts its performance in the marine combat environment. …”
Get full text
Article -
80
Simulated Adversarial Attacks on Traffic Sign Recognition of Autonomous Vehicles
Published 2025-04-01“…Different attack methods interfered with the original machine learning model to a certain extent, hindering autonomous vehicles from recognizing traffic signs and detecting them accurately.…”
Get full text
Article