Abstract
Security research can be improved by more effectively sharing what is learned from attacks on information systems.
- Basin, D. and Cremers, C. Modeling and analyzing security in the presence of compromising adversaries. In Computer Security---ESORICS 2010, volume 6345 of Lecture Notes in Computer Science. Springer, 2010, 340--356. Google ScholarDigital Library
- Coverity Scan: 2011 Open Source Integrity Report. Coverity, Inc. San Francisco, CA, 2011.Google Scholar
- Francillon, A., Danev, B., and Capkun, S. Relay attacks on passive keyless entry and start systems in modern cars. In Proceedings of the Network and Distributed System Security Symposium, 2011.Google Scholar
- Halperin, D. et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, SP '08, IEEE Computer Society Washington, D.C., 2008, 129--142. Google ScholarDigital Library
- Lowe, G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software---Concepts and Tools 17, 3 (1996), 93--102.Google Scholar
- Rouf, I. et al. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In Proceedings of the 19th USENIX Conference on Security, USENIX Security'10. USENIX Association, Berkeley, CA, 2010, 21. Google ScholarDigital Library
Index Terms
- The research value of publishing attacks
Recommendations
Denial of service attacks, defences and research challenges
This paper presents a review of current denial of service (DoS) attack and defence concepts, from a theoretical ad practical point of view. Seriousness of DoS attacks is tangible and they present one of the most significant threats to assurance of ...
Scriptless attacks: Stealing more pie without touching the sill
Web Application Security Web @ 25Due to their high practical impact, Cross-Site Scripting (XSS) attacks have attracted a lot of attention from the members of security community worldwide. In the same way, a plethora of more or less effective defense techniques have been proposed, ...
Research on DDoS Attacks in IPv6
CSAE '20: Proceedings of the 4th International Conference on Computer Science and Application EngineeringWith the gradual replacement of IPv4 by IPv6, Distributed Denial-of-Service (DDoS) attacks that have plagued IPv4 appear in IPv6 more or less, and affect the normal operation of IPv6. However, the current research on how to construct a secure DDoS ...
Comments