Balancing need with numbers: assessing need by downscaling and weighting vulnerability data with population density
Abstract
Index Terms
- Balancing need with numbers: assessing need by downscaling and weighting vulnerability data with population density
Recommendations
There is safety in numbers: preventing control-flow hijacking by duplication
NordSec'12: Proceedings of the 17th Nordic conference on Secure IT SystemsDespite the large number of proposed countermeasures against control-flow hijacking attacks, these attacks still pose a great threat for today's applications. The problem with existing solutions is that they either provide incomplete probabilistic ...
Balancing the shadows
WPES '10: Proceedings of the 9th annual ACM workshop on Privacy in the electronic societyIn this paper, we examine the ShadowWalker peer-to-peer anonymity scheme. ShadowWalker attempts to provide anonymity via circuits built using random walks over a secured topology. ShadowWalker's topology is secured through the use of shadows, peers that ...
On the Need of Randomness in Fault Attack Countermeasures - Application to AES
FDTC '12: Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in CryptographyRecent works show that a combination of perturbation and observation attacks on symmetric ciphers thwarts state-of-the-art countermeasures. In this paper, we first propose a new way - to our knowledge - to classifyfault attacks against block ciphers, ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 51Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in