Results 71 to 80 of about 640,321 (187)

Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves

open access: yes, 2017
Intel Software Guard Extension (SGX) offers software applications enclave to protect their confidentiality and integrity from malicious operating systems.
Almeida José Bacelar   +18 more
core   +1 more source

Deniable Authentication Protocol Resisting Man-In-The-Middle Attack

open access: yes, 2007
Deniable authentication is a new protocol which not only enables a receiver to identify the source of a received message but also prevents a third party from identifying the source of the message. The proposed protocol in this paper makes use of bilinear pairings over elliptic curves, as well as the Diffie-Hellman key exchange protocol.
Han, Song, Wanquan Liu, Chang, Elizabeth
openaire   +1 more source

Man in the middle attacks

open access: yes, 2020
Cyber-security becomes more and more important as the technology moves forward. Having knowledge about the technologies of the modern world is crucial and helps to make a better and safer environment. This study identifies and demonstrates some of the methods which are used to exploit two or potentially more hosts in a network. Exploiting weaknesses in
openaire   +1 more source

Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems

open access: yesMathematics
Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities.
Mun-Suk Kim
doaj   +1 more source

Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity

open access: yesCryptography, 2018
Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability— ...
James Jin Kang   +2 more
doaj   +1 more source

Authenticated tree parity machine key exchange

open access: yes, 2004
The synchronisation of Tree Parity Machines (TPMs), has proven to provide a valuable alternative concept for secure symmetric key exchange. Yet, from a cryptographer's point of view, authentication is at least as important as a secure exchange of keys ...
Schaumburg, André, Volkmer, Markus
core  

A Review of Man-in-the-Middle Attacks

open access: yes, 2015
This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session ...
openaire   +2 more sources

Spoiled Onions: Exposing Malicious Tor Exit Relays

open access: yes, 2014
Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous.
Lindskog, Stefan, Winter, Philipp
core  

Evaluating AES-128 Segment Encryption in Live HTTP Streaming Under Content Tampering and Packet Loss

open access: yesNetwork
One of the main sources of entertainment is live video streaming platforms, which allow viewers to watch video streams in real time. However, because of the increasing demand for high quality content, the vulnerability of streaming systems against ...
Bzav Shorsh Sabir, Aree Ali Mohammed
doaj   +1 more source

Home - About - Disclaimer - Privacy