Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In the past two decades, targeted online advertising has led to massive data collection, aggregation, and exchange. This infrastructure raises significant privacy concerns. While several prominent theories of data privacy have been proposed over the same period of time, these notions have limited application to advertising ecosystems. Differential privacy, the most robust of them, is inherently inapplicable...
In this work we consider the problem of a PUF-based authentication model with a generated secret key. The considered scenario is that after an enrollment phase, where for several challenge-response pairs a secret key and helper data is generated, the decoder will choose one of the challenges uniform at random for authentication, this time the PUF provides a noisy version of the original response;...
Most of the physical-layer authentication methods are based on the pre-knowledge of the channel information and the threshold is fixed before the communication process. In this paper, we propose a physical layer authentication method based on channel information and machine learning with a dynamic threshold in wireless communication environment. In this method, the threshold of the channel differences...
On this poster, we publish a first view on a novel tool we call VulMap. VulMap is a political organized map, that color-codes overall severity of information system vulnerabilities to geographical areas. To attain this, we combine publicly available data sets of vulnerabilities, internet-wide port scans and geolocation databases. The most difficult hurdle to overcome is the link between vulnerabilities...
We consider a single-cell massive multiple-input multiple-output (MIMO) system in which a base station (BS) with a large number of antennas simultaneously transmits to K single-antenna users in the presence of an attacker. Massive MIMO systems often operate in a time division duplexing (TDD) fashion. The BS estimates the channel state information (CSI) at receivers based on their uplink pilot transmissions...
In the era of big data processing, it is desirable to manage large volumes of data with high scalability, confidentiality protection, and flexible types of search queries. In this paper, we propose a design to store encrypted data on a cluster of distributed servers while supporting secure and authorized Boolean queries. In particular, the data owner encrypts the database with encrypted searchable...
We present an analysis of how to determine security requirements for software that controls routing decisions in the distribution of discrete physical goods. Requirements are derived from stakeholder interests and threat scenarios. Three deployment scenarios are discussed: cloud and hybrid deployment as well as on-premise installation for legacy sites.
For over a decade now, cross-site request forgery (CSRF) has been persistently named one of the OWASP's top 10 Web vulnerabilities. Recently, a variant of CSRF — named cross-site framing attack (CSFA) — has also been identified. Both attacks are very simple to implement/execute while resulting in potentially devastating consequences for the victim. What distinguishes the two attacks is their ultimate...
We investigate the possibility of covert and secret key generation over a discrete memoryless channel model with one way public discussion. Protocols are required to conceal not only the key but also whether a protocol is being implemented. For some models, we show that covert secret key generation is possible and characterize the covert secret key capacity in special cases; in particular, the covert...
Data centers availability is mandatory and is conditioned by a quick response to failures and attacks thanks to efficient live forensics. However, this task is lately impossible to complete with classic systems because of encountered data rates and service diversity. Moreover, Software-Defined Networking (SDN) devices agility requirements prevent the use of Application Specific Integrated Circuits...
In this poster, we propose leveraging intercontroller communication between two or more controllers in Software Defined Networks (SDNs) to inform other controllers about potential attacks so that they can proactively apply a mitigation strategy. We demonstrate and measure the effectiveness of our method by running a series of tests in an emulated network. We analyze our test results in terms of reducing...
Cloud computing is attracting increasing attention since it enables clients with limited computing resources to perform and complete large-scale computations. However, it also comes up with some security and privacy concerns and challenges, such as the input and output privacy of the client, and cheating behaviors of the cloud. Motivated by these issues and focused on engineering optimization tasks,...
One of the challenges in designing dual communication and radar systems employing multi-carrier waveforms is addressing the separate radar and communication objectives. This challenge becomes more difficult when one considers that such a system would be the target of malicious attacks, especially those involving interference. In this paper, to gain insight into the problem, a game-theoretical model...
Economic Denial of Sustainability (EDoS) attacks have been threatening cloud consumers' financial viability due to the “pay-as-you-go” cloud resource charging scheme. EDoS attackers can take advantage of this pricing scheme to fraudulently consume the billable cloud resources from the cloud consumers and thus, drive up the cloud consumers' financial cost and eventually disrupt their economic sustainability...
Large numbers of Internet of Things (IoT) devices are increasingly deployed in many aspects of modern life. Given their limited resources and computational power, verifying program integrity in such devices is a challenging issue. In this paper, we design MTRA, a Multiple-Tier Remote Attestation protocol, by exploiting differences in resources and computational power among various types of networked...
Security threats such as jamming and route manipulation can have significant consequences on the performance of modern wireless networks. To increase the efficacy and stealthiness of such threats, a number of extremely challenging, next-generation cross-layer attacks have been recently unveiled. Although existing research has thoroughly addressed many single-layer attacks, the problem of detecting...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.