Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Given Android's popularity, it is likely that Android devices will be targeted with increasing frequency by malware designers, in particular by programs which are designed to steal some of the sensitive personal or financial information. This threat puts an obligation on security professionals and software developers to work to ensure that the Android platform is as secure as possible. Users of mobile...
We require a very good technical knowledge to create automated tests to exploit the browser vulnerabilities. It is usually a combination of technical abilities and set of specific tools. Security concerns is of prime importance when it comes to web browsers. Attacks during surfing, executing any downloaded file and while transmission are very frequent these days and hence all browsers need to be hardened...
Security in Cyber-Physical Systems (CPS) has become a serious concern owing to the rapid adoption of technologies such as plug-and-play connectivity, robotics and remote coordination and control. It is well understood that the performance overhead incurred due to security considerations is rather high, which needs to be captured holistically for a real-time CPS with strict timing budget and hard deadlines...
Decision making in modern large-scale and complex systems such as communication networks, smart electricity grids, and cyber-physical systems motivate novel game-theoretic approaches. This paper investigates big strategic (non-cooperative) games where a finite number of individual players each have a large number of continuous decision variables and input data points. Such high-dimensional decision...
Day to day life is more unsecure as per the hacking is concerned. Our data is not secure because it can be stolen, hacked, destroy, manipulate, password may forget, guess, Card, token, etc. To overcome this problem biometrics is used as a strong authentication system. The person should be present at the time of the instance. Biometric security is challenging task in day to day life because it is difficult...
The growing popularity of high performance computing has led to a new focus on bypassing or eliminating traditional I/O operations that are usually the bottlenecks for fast processing of large data volumes. One such solution uses a new network communication protocol called InfiniBand (IB) which supports remote direct memory access without making two copies of data (one in user space and the other...
Side-scan sonar technology has been used over the last three decades for underwater surveying and imaging. Application areas of side-scan sonar include archaeology, security and defence, seabed classification, and environmental surveying. In recent years the use of autonomous underwater systems has allowed for automatic collection of data. Along with automatic collection of data comes the need to...
Application-level firewalls filter traffic based on a white list of processes that are allowed to access the network. Although they have a complete overview of the system in which they are executed, they can be easily bypassed by knowledgable attackers. In this paper we present AL-SAFE, a cloud-tailored application-level self-adaptable firewall which combines the high degree of visibility of an application-level...
With the rapid development of network technology and the increasingly complexity of system function, the embedded system is facing more and more serious threats. Previous researches on kernel monitoring and protection widely relies on higher privileged system components, such as hardware virtualization extensions, to isolate security tools from potential kernel attacks. These approaches increase both...
Future avionics is no longer mere close electronic systems with the requirement changed, while it is pervasively controlled by dozens of frequent information exchange, open architecture and highly automatic systems. And this transformation has driven major advancements of security in avionics which contains computing security and communication security. Our team is focused on the security of next...
The combined attacks are widely spread in the domain of smart cards and microcontrollers but they have not been yet democratized on System on chip (SoC) such as those that can be found in smart phones, tablets and automotive systems. The main reason behind this is the complexity to inject a fault at the right place and at the right time to make these attacks effective on such devices. However for...
To prevent attacks on essential software and to mitigate damage, an attack avoiding method that complicates process identification from attackers is proposed. This method complicates the identification of essential services by replacing process information with dummy information. However, this method allows attackers to identify essential processes by detecting changes in process information. To address...
While all cloud based platforms possess security vulnerabilities, the additional security challenges with container systems stem from the sharing of Host OS among independent containers. If a malicious application was to break into the root of container Daemon, it could gain root access into the host kernel thereby compromising the entire system. It could create Denial-Of-Service attack for other...
Software metrics can be used as a indicator of the presence of software vulnerabilities. These metrics have been used with machine learning to predict source code prone to contain vulnerabilities. Although it is not possible to find the exact location of the flaws, the models can show which components require more attention during inspections and testing. Each new technique uses his own evaluation...
Software diversity has been applied to operating system kernels to protect against code-reuse attacks. However, the security of fine-grained software diversification relies on ensuring that the code layout remains secret. Unfortunately, memory disclosure vulnerabilities assist adversaries in bypassing software diversity protections by leaking the code layout. In this paper, we propose KHide, a system...
Whole-system data provenance provides deep insight into the processing of data on a system, including detecting data integrity attacks. The downside to systems that collect whole-system data provenance is the sheer volume of data that is generated under many heavy workloads. In order to make provenance metadata useful, it must be stored somewhere where it can be queried. This problem becomes even...
Artificial fish-swarm algorithm is a novel method to search global optimum, which is typical application of behaviorism in artificial intelligence. Compared with traditional method it is more portability and stability. This paper, based on the loss function to increase the enterprise benefit, brings forward an optimized criterion of setting threshold to relieve the security officer work in the chemical...
Mixed criticality functions integrated on a single computing platform require special attention to safety and security. ARINC 653 and DO-248 provide guidelines for partitioning software so that functions of differing levels of criticality are isolated from one another. The partitioning environment operating system isolates each partition, and because it is foundational it must be certified to the...
In this paper, we consider to seek vulnerabilities and we conduct possible attacks on the crucial and essential parts of Android OSs architecture including the framework and the Android kernel layers. As a regard, we explain the Binder component of Android OS from security point of view. Then, we demonstrate how to penetrate into the Binder and control data exchange mechanism in Android OS by proposing...
Today iris recognition systems are extensively used for security and authentication purposes due to their simplicity and high reliability. But these systems face a major challenge of being spoofed by high quality printed iris images or pictures captured by camera. The problem is aggravated by use of varying illumination conditions in an attack access attempt. This paper investigates spoofing attempts...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.