A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on Phishing Attacks
2014
International Journal of Computer Applications
In this paper we make a survey about various attacks and their problems and establish a problem statement for finding the optimum solution for the problem arises. ...
A secure and efficient technique is required to detect and prevent the attacks over the network transaction. ...
Machine Learning Algorithm: this solution work on prediction, based on known properties learned from the training data set. As we discuss, all techniques involved in prevention of phishing attack. ...
doi:10.5120/15392-4007
fatcat:tfo3yztgkfawtlw2hwf3bf5w4i
Microarchitectural Attacks in Heterogeneous Systems: A Survey
2022
ACM Computing Surveys
In this survey article, we consider the security of heterogeneous systems against microarchitectural attacks, with a focus on covert- and side-channel attacks, as well as fault injection attacks. ...
With the increasing proliferation of hardware accelerators and the predicted continued increase in the heterogeneity of future computing systems, it is necessary to understand the security properties of ...
Then they utilize machine learning approaches to identify the victim's GPU workload among a small set of several entertainment and deep learning workloads.
Side Channel Defenses on Discrete GPUs. ...
doi:10.1145/3544102
fatcat:dm3l4etg5vealdqyodhuopjhgy
The Threat of Adversarial Attacks on Machine Learning in Network Security – A Survey
[article]
2020
arXiv
pre-print
In this survey, we first provide a taxonomy of machine learning techniques, styles, and algorithms. We then introduce a classification of machine learning in network security applications. ...
However, applications of machine learning in network security face more disproportionate threat of active adversarial attacks compared to other domains. ...
. • Deep Learning Techniques for Side-Channel Analysis Prouff et al. ...
arXiv:1911.02621v2
fatcat:p7mgj65wavee3op6as5lufwj3q
De-anonymisation attacks on Tor: A Survey
2021
IEEE Communications Surveys and Tutorials
In this survey paper, we review known Tor attacks and identify current techniques for the de-anonymisation of Tor users and hidden services. ...
We discuss these techniques and analyse the practicality of their execution method. ...
side-channel attacks. ...
doi:10.1109/comst.2021.3093615
fatcat:fjc3r2672bbz3m4rtdiweurmby
Physical Side-Channel Attacks on Embedded Neural Networks: A Survey
2021
Applied Sciences
In particular, embedded DNN implementations are vulnerable to Side-Channel Analysis (SCA) attacks, which are especially important in the IoT and edge computing contexts where an attacker can usually gain ...
Without a complete review of this emerging field in the literature so far, this paper surveys state-of-the-art physical SCA attacks relative to the implementation of embedded DNNs on micro-controllers ...
Conflicts of Interest: The authors declare no conflicts of interest. ...
doi:10.3390/app11156790
fatcat:h6ucd5p5yrgbnbrco2t2o3s2rm
Attacking Image Watermarking and Steganography - A Survey
2019
International Journal of Information Technology and Computer Science
Data hiding is essential in many applications such as communication channel security, data security and forgery detection. Watermarking is used in copyright protection. ...
Image hiding attacks can be active or passive. In active attack, the attacker changes the content of the data. While in passive attacks the attacker tries to guess the secure data by eavesdropping. ...
A comprehensive survey on watermarking security is introduced in [53] , year 2006. The authors covered the theoretical side of watermarking security. ...
doi:10.5815/ijitcs.2019.03.03
fatcat:bjbiaqox6jeupiuui33ej2luay
Anonymity with Tor: A Survey on Tor Attacks
[article]
2020
arXiv
pre-print
In this paper, we survey known Tor attacks and identify currently available techniques that lead to improved de-anonymisation of users and hidden services. ...
As a result, various parties, including governments and law enforcement agencies, are interested in attacks that assist in de-anonymising the Tor network, disrupting its operations, and bypassing its censorship ...
Their work focuses on how machine learning techniques have been applied to such classifications and compares those techniques. ...
arXiv:2009.13018v2
fatcat:eaijzylajvfxxluoueu3yf66mu
Ransomware Attack and Remedial: A Survey
2020
International Journal of Innovative Research in Applied Sciences and Engineering
However, most of the method that mention above are the general way to prevent the system from ransomware. In this report, we will discuss in more detail about the latest ransomware attacks. ...
Ransomware is a type of malware that deny user access to its own system and demands payment before the system is restored. ...
Many researcher are using machine learning algorithm in IDS for detection of unknown ransomware [28] . 4. Incident Response: a. Setting-Up an Incident Response Plan. ...
doi:10.29027/ijirase.v3.i7.2020.490-497
fatcat:he45gfcyh5ad3mu2ahnnnwa5vi
Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks
2017
Electronics
Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access ...
The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can ...
Fournaris conceived and structured the paper's concept, did the overview on cache35 attacks, side channel attacks and countermeasures and contributed to the survey research of the rowhammer microarchitectural ...
doi:10.3390/electronics6030052
fatcat:7twtik7awjdcrk62xzbaqkaq4y
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography
[article]
2021
arXiv
pre-print
Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. ...
In this paper, we systematize microarchitectural side channels with a focus on attacks and defenses in cryptographic applications. ...
This paper provides a comprehensive survey of microarchitectural side-channel attacks and defenses in cryptographic applications. ...
arXiv:2103.14244v1
fatcat:u35eyivqbngplfa4qrswfsqqti
A Survey on Cloud Attack Detection using Machine Learning Techniques
2020
International Journal of Computer Applications
This survey provides a comprehensive study of cloud security concerns, traditional security measures, and machine learning-based security solutions in the cloud environment. ...
The deep learning is a branch of machine learning that provides remarkable performance in cloud security issues. ...
The different kinds of attacks exist in the cloud [18, 19] , including the Distributed Denial of Service (DDoS) Attack [20] , malware injection attack, side-channel attack, Man-in-the-Middle (MITM) attack ...
doi:10.5120/ijca2020920887
fatcat:5kk66mrxcffhnajfovglapfasu
Semantics-aware detection of targeted attacks: a survey
2016
Journal in Computer Virology and Hacking Techniques
To overcome these obstacles, we present a structured review of semantics-aware works that have a high potential for contributing to the analysis or detection of targeted attacks. ...
In today's interconnected digital world, targeted attacks have become a serious threat to conventional computer systems and critical infrastructure alike. ...
Pölten -University of Applied Sciences. ...
doi:10.1007/s11416-016-0273-3
fatcat:flhbpc4uwbandby2adxi62t64u
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
2015
IEEE Communications Surveys and Tutorials
In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. ...
Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. ...
helped us improved the quality of this paper significantly. ...
doi:10.1109/comst.2015.2422735
fatcat:dc3yq7dparbapht5nswwhhmzr4
A Survey on Split Manufacturing: Attacks, Defenses, and Challenges
[article]
2020
arXiv
pre-print
In our survey, we present a detailed overview of the technique, the many types of attacks towards Split Manufacturing, as well as possible defense techniques described in the literature. ...
In order to overcome security concerns associated with the outsorcing of IC fabrication, the Split Manufacturing technique was proposed. ...
A Machine Learning (ML) framework was used by Zhang et al. [20] in an attempt to improve the attack proposed in [18] . The same setup as previously discussed was utilized. ...
arXiv:2006.04627v2
fatcat:ie6b22vw25d35brv24ue7vlodq
Survey of Attacks and Defenses on Edge-Deployed Neural Networks
[article]
2019
arXiv
pre-print
In this work, we cover the landscape of attacks on, and defenses, of neural networks deployed in edge devices and provide a taxonomy of attacks and defenses targeting edge DNNs. ...
While datacenter networks can be protected using conventional cybersecurity measures, edge neural networks bring a host of new security challenges. ...
In order to violate the integrity of a machine learning model, attackers may attempt to find adversarial examples [35] . ...
arXiv:1911.11932v1
fatcat:zihiqvq2tbd3zpuyvwqrrf5itq
« Previous
Showing results 1 — 15 out of 23,094 results