Results 11 to 20 of about 2,626,008 (101)
Adversarial Robustness of Hybrid Machine Learning Architecture for Malware Classification [PDF]
The detection heuristic in contemporary machine learning Windows malware classifiers is typically based on the static properties of the sample. In contrast, simultaneous utilization of static and behavioral telemetry is vaguely explored.
Trizna, Dmitrijs
core
We present a new side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache.
D. Gruss+7 more
semanticscholar +1 more source
Continuous variable quantum cryptography using coherent states [PDF]
We propose several methods for quantum key distribution (QKD) based upon the generation and transmission of random distributions of coherent or squeezed states, and we show that they are are secure against individual eavesdropping attacks.
A. Einstein+20 more
core +4 more sources
SpyHammer: Using RowHammer to Remotely Spy on Temperature
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row by just accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate that new DRAM devices are becoming increasingly more vulnerable to RowHammer ...
Jattke, Patrick+9 more
core +1 more source
Cloning and Cryptography with Quantum Continuous Variables [PDF]
The cloning of quantum variables with continuous spectra is investigated. We define a Gaussian 1-to-2 cloning machine, which copies equally well two conjugate variables such as position and momentum or the two quadrature components of a light mode.
Cerf, N. J.+2 more
core +4 more sources
Biometric Template Security using Dorsal Hand Vein Fuzzy Vault
Biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the authentication process. More importantly template security is of vital importance in the biometric systems because unlike passwords, stolen biometric ...
Professor and Chief Executive Bannari A M Natarajan+1 more
semanticscholar +1 more source
Post-quantum cryptographic hardware primitives [PDF]
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi+3 more
core
CRC-PUF: A Machine Learning Attack Resistant Lightweight PUF Construction
Adversarial machine learning is an emerging threat to security of Machine Learning (ML)-based systems. However, we can potentially use it as a weapon against ML-based attacks.
E. Dubrova+4 more
semanticscholar +1 more source
Information Security Games: A Survey [PDF]
We introduce some preliminaries about game theory and information security. Then surveying a subset of the literature, we identify opportunities for future research.
arxiv
Genetic attack on neural cryptography
Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography.
A. Engel+12 more
core +1 more source