4,260 Hits in 7.3 sec

Revisiting the Hybrid attack on sparse and ternary secret LWE [article]

Yongha Son, Jung Hee Cheon
2019 IACR Cryptology ePrint Archive  
In this work, we revisit the well-known Howgrave-Graham's hybrid attack, which was originally designed to solve the NTRU problem, with respect to sparse and ternary secret LWE case, and also refine the  ...  Moreover, upon our analysis we estimate attack complexity of the hybrid attack for several LWE parameters.  ...  Wunderer, T.: Revisiting the hybrid attack: Improved analysis and refined security estimates.  ... 
dblp:journals/iacr/SonC19 fatcat:xp2e7mhxdjbo3lbnn52j7ee6xa

The public-private divide revisited: questioning the middle ground of hybridity in policing

Martin Nøkleberg
2019 Policing and Society: An International Journal of Research and Policy  
and security governance from the Nordic context.  ...  The topic of this dissertation is the policing of global hubs, and it is particularly concerned with the security governance arrangements found at Norwegian airports and maritime ports.  ...  Disclosure statement No potential conflict of interest was reported by the author. POLICING AND SOCIETY 615  ... 
doi:10.1080/10439463.2019.1576673 fatcat:x2s4i3tprfe2loiu5gcyztgzi4

Hybrid Monitoring of Attacker Knowledge

Frederic Besson, Nataliia Bielova, Thomas Jensen
2016 2016 IEEE 29th Computer Security Foundations Symposium (CSF)  
The monitor and its static analysis have been formalized and proved correct within the Coq proof assistant.  ...  To get a precise estimate of the knowledge, the monitor statically analyses non-executed branches.  ...  Acknowledgement This research has been partially supported by the French ANR projects AJACS ANR-14-CE28-0008 and ANR-10-LABX-07-01 Laboratoire d'excellence Comin-Labs.  ... 
doi:10.1109/csf.2016.23 dblp:conf/csfw/BessonBJ16 fatcat:kvjvggyh25hdbibz4nyhzfzer4

DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees [article]

Barbara Kordy, Ludovic Piètre-Cambacédès, Patrick Schweitzer
2013 arXiv   pre-print
This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs).  ...  The objective of this survey is to present a complete overview of graphical attack and defense modeling techniques based on DAGs.  ...  Acknowledgments The authors would like to thank Sjouke Mauw and Pieter Hartel for their comments on a preliminary version of this survey, which helped them to improve the paper.  ... 
arXiv:1303.7397v1 fatcat:fiebxymrd5dcnmnufddaoaqlaa

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

Barbara Kordy, Ludovic Piètre-Cambacédès, Patrick Schweitzer
2014 Computer Science Review  
In this paper we focus on graphical methods for analysis of attack and defense scenarios.  ...  Keywords: graphical models for security; attack trees; Bayesian networks; attack and defense modeling; quantitative and qualitative security assessment; security measures.  ...  Improved Attack Trees Improved attack trees aim at dealing with security risks that arise in space-based information systems.  ... 
doi:10.1016/j.cosrev.2014.07.001 fatcat:aie7uxdorjclnb5ctgg5nrczqi

MAD-HTLC: Because HTLC is Crazy-Cheap to Attack [article]

Itay Tsabary, Matan Yechieli, Alex Manuskin, Ittay Eyal
2021 arXiv   pre-print
If a user misbehaves, MAD-HTLC incentivizes the miners to confiscate all her funds. We prove MAD-HTLC's security using the UC framework and game-theoretic analysis.  ...  We demonstrate this attack can be easily implemented by patching the Bitcoin client, and use game-theoretic tools to qualitatively tighten the known cost bound of such bribery attacks in presence of rational  ...  We then revisit the security of the prevalent HTLC implementation and refine previous results [28] regarding its vulnerability to bribing attacks ( §VII).  ... 
arXiv:2006.12031v3 fatcat:xjth2tcf35gtxegphnalg6onx4

LWE with Side Information: Attacks and Concrete Security Estimation [chapter]

Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi
2020 Lecture Notes in Computer Science  
In particular, our work can estimates security loss even given very little side information, leading to a smooth measurement/computation trade-off for side-channel attacks.  ...  Our main contribution is to propose a toolbox and a methodology to integrate such hints into lattice reduction attacks and to predict the performance of those lattice attacks with side information.  ...  We also thank John Schanck for valuable references and discussions that lead to refinements of the section on NTRU.  ... 
doi:10.1007/978-3-030-56880-1_12 fatcat:bjyynvzt3fdljleurrse3dbogq

An Evaluation of Uncle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined with an Eclipse Attack

Yizhong Liu, Yiming Hei, Tongge Xu, Jianwei Liu
2020 IEEE Access  
Secondly, we simulate possible attacks, and the results show that the Ethereum selfish and stubborn mining strategies not only increase the reward of an attacker but also decrease the security threshold  ...  In order to solve the security problems that may be caused by the orphan block and improve the transaction processing efficiency, Ethereum introduces the uncle block mechanism, i.e., an orphan block may  ...  Besides refining the structure of blockchain, Ethereum has another two security improvements. One is the random tie breaking rule.  ... 
doi:10.1109/access.2020.2967861 fatcat:afxgioss4nhpvia4m3wh5fyg3i

Reducing Efficiency of Connectivity-Splitting Attack on Newscast via Limited Gossip [chapter]

Jakub Muszyński, Sébastien Varrette, Pascal Bouvry
2016 Lecture Notes in Computer Science  
We further refine this method to find solutions that cannot be improved by flipping r or fewer bits, which counterintuitively can reduce total runtime.  ...  Among such attacks are SQL injection attacks.  ... 
doi:10.1007/978-3-319-31204-0_20 fatcat:27rnwllk75cv5kncys2u7utreq

Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem [article]

Magali Bardet and Pierre Briaud and Maxime Bros and Philippe Gaborit and Jean-Pierre Tillich
2022 arXiv   pre-print
However, we prove here that the analysis performed in for one of these attacks which consists in mixing the MaxMinors modeling with the Support-Minors modeling to solve RD is too optimistic and leads to  ...  Both improved significantly the complexity of algebraic attacks on these two problems.  ...  In particular, the first attacks specific to the RD problem were of combinatorial nature [26] . They were significantly improved in [45] and further refined in [36, 13] .  ... 
arXiv:2208.05471v1 fatcat:god2csfjbbb6zdlbzh4tbwo52i

A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds

Yi-Hsuan Kung, Taeho Lee, Po-Ning Tseng, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Yue-Hsun Lin, Adrian Perrig
2015 2015 IEEE 23rd International Conference on Network Protocols (ICNP)  
With the growing incidents of flash crowds and sophisticated DDoS attacks mimicking benign traffic, it becomes challenging to protect Internet-based services solely by differentiating attack traffic from  ...  We prove that every client complying with RCF can access the server in bounded time, even under a flash crowd incident or a DDoS attack.  ...  We also gratefully acknowledge support by ETH Zurich and by NSF under award number CNS-1040801.  ... 
doi:10.1109/icnp.2015.11 dblp:conf/icnp/KungLTHKLLP15 fatcat:6h67r4ntlrghxizruc73edxowy

A Time-Series Self-Supervised Learning Approach to Detection of Cyber-physical Attacks in Water Distribution Systems

Haitham Mahmoud, Wenyan Wu, Mohamed Medhat Gaber
2022 Energies  
The attack detection system must meet two critical requirements: high accuracy and near real-time detection.  ...  ., data encryption and authentication), attack detection is being proposed in WDS to reduce disruption cases.  ...  Nevertheless, applying an attack detection system along with data encryption and system authentication will improve the security of the network, more complex attacks may be able to fool the water network  ... 
doi:10.3390/en15030914 fatcat:dzn2k5ghjvdtvelcydwrx2zz54

May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 [article]

Daniel Genkin, Luke Valenta, Yuval Yarom
2017 IACR Cryptology ePrint Archive  
CCS CONCEPTS • Security and privacy → Cryptanalysis and other attacks; Public key encryption;  ...  In recent years, applications increasingly adopt security primitives designed with better countermeasures against side channel attacks.  ...  ACKNOWLEDGMENTS We thank Eric Wustrow for pointing out the existence of low-order elements in Curve25519.  ... 
dblp:journals/iacr/GenkinVY17 fatcat:jg4s34gn4jb2jeqjnlf3upu7bq

Asset divestment as a response to media attacks in stigmatized industries

Rodolphe Durand, Jean-Philippe Vergne
2014 Strategic Management Journal  
Specifically, attacks on the focal firm are the most consequential, followed by attacks on peers in the same industry subcategory, and by attacks on peers in different subcategories.  ...  Our analyses of the arms industry demonstrate that media attacks on the focal firm and its peers both increase the likelihood of divestment for the focal firm.  ...  Security Council and that the exported weapons were used across the Middle East and North Africa to suppress waves of protest against various dictators (i.e., during the 2011 "Arab Spring").  ... 
doi:10.1002/smj.2280 fatcat:gik4wkswjnbunoq5wyeavzpu74

On a hybrid approach to solve binary-LWE [article]

Thomas Espitau, Antoine Joux, Natalia Kharchenko
2020 IACR Cryptology ePrint Archive  
In this paper, we investigate the security of the Learning With Error (LWE) problem with small secrets by refining and improving the so-called dual lattice attack.  ...  Besides, we aim at providing a sound and non-asymptotic analysis of the techniques to enable its use for practical selection of security parameters.  ...  Following these two works, Wunderer has provided an improved analysis of the hybrid decoding lattice attack and meet-in-the-middle attack and re-estimated security of several LWE and NTRU based cryptosystems  ... 
dblp:journals/iacr/EspitauJK20 fatcat:t7pegp647ndh7effnxivjmzxoq
« Previous Showing results 1 — 15 out of 4,260 results