Filters








1 Hit in 2.2 sec

D1.3 Cyberthreats and countermeasures

Mark Ryan, Kevin Macnish, Tally Hatzakis
2019
new avenues for attackers.  ...  This situation parallels to vulnerability disclosure, where researchers often need to make a trade-off between disclosing a vulnerability publicly (opening it up for potential abuse) and not disclosing  ...  Defender: Create a regular expression or matching rule to detect the message. Attacker: Replace words and phrases based on a simple set of rules to generate multiple messages with the same meaning.  ... 
doi:10.21253/dmu.7951292.v1 fatcat:w3z55dymsjcwfkhp7opx4pvhui