Results 11 to 20 of about 2,626,008 (101)

Adversarial Robustness of Hybrid Machine Learning Architecture for Malware Classification [PDF]

open access: yes, 2022
The detection heuristic in contemporary machine learning Windows malware classifiers is typically based on the static properties of the sample. In contrast, simultaneous utilization of static and behavioral telemetry is vaguely explored.
Trizna, Dmitrijs
core  

Page Cache Attacks [PDF]

open access: yesConference on Computer and Communications Security, 2019
We present a new side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache.
D. Gruss   +7 more
semanticscholar   +1 more source

Continuous variable quantum cryptography using coherent states [PDF]

open access: yes, 2001
We propose several methods for quantum key distribution (QKD) based upon the generation and transmission of random distributions of coherent or squeezed states, and we show that they are are secure against individual eavesdropping attacks.
A. Einstein   +20 more
core   +4 more sources

SpyHammer: Using RowHammer to Remotely Spy on Temperature

open access: yes, 2022
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row by just accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate that new DRAM devices are becoming increasingly more vulnerable to RowHammer ...
Jattke, Patrick   +9 more
core   +1 more source

Cloning and Cryptography with Quantum Continuous Variables [PDF]

open access: yes, 2001
The cloning of quantum variables with continuous spectra is investigated. We define a Gaussian 1-to-2 cloning machine, which copies equally well two conjugate variables such as position and momentum or the two quadrature components of a light mode.
Cerf, N. J.   +2 more
core   +4 more sources

Biometric Template Security using Dorsal Hand Vein Fuzzy Vault

open access: yes, 2012
Biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the authentication process. More importantly template security is of vital importance in the biometric systems because unlike passwords, stolen biometric ...
Professor and Chief Executive Bannari A M Natarajan   +1 more
semanticscholar   +1 more source

Post-quantum cryptographic hardware primitives [PDF]

open access: yes, 2020
The development and implementation of post-quantum cryptosystems have become a pressing issue in the design of secure computing systems, as general quantum computers have become more feasible in the last two years.
Agrawal, Rashmi   +3 more
core  

CRC-PUF: A Machine Learning Attack Resistant Lightweight PUF Construction

open access: yes2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2019
Adversarial machine learning is an emerging threat to security of Machine Learning (ML)-based systems. However, we can potentially use it as a weapon against ML-based attacks.
E. Dubrova   +4 more
semanticscholar   +1 more source

Information Security Games: A Survey [PDF]

open access: yesarXiv, 2021
We introduce some preliminaries about game theory and information security. Then surveying a subset of the literature, we identify opportunities for future research.
arxiv  

Genetic attack on neural cryptography

open access: yes, 2006
Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography.
A. Engel   +12 more
core   +1 more source

Home - About - Disclaimer - Privacy