ATTACKS

作品数:470被引量:519H指数:9
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张颖李彦辉王新生更多>>
相关机构:华南理工大学湖南大学中南大学重庆大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=China Communicationsx
条 记 录,以下是1-10
视图:
排序:
EBCache:A Novel Cache-Based Mechanism for Mitigating the Spectre Attacks for RISC-V Processor
《China Communications》2024年第12期166-185,共20页Wu Dehua Xiao Wan’ang Gao Wanlin 
This work was supported in part by the China Ministry of Science and Technology under Grant 2015GA600002。
The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping funct...
关键词:cache structure out-of-order execution side-channel attacks the Spectre attacks 
Primary User Adversarial Attacks on Deep Learning-Based Spectrum Sensing and the Defense Method被引量:4
《China Communications》2021年第12期94-107,共14页Shilian Zheng Linhui Ye Xuanye Wang Jinyin Chen Huaji Zhou Caiyi Lou Zhijin Zhao Xiaoniu Yang 
the National Nat-ural Science Foundation of China under Grant No.62072406,No.U19B2016,No.U20B2038 and No.61871398;the Natural Science Foundation of Zhejiang Province under Grant No.LY19F020025;the Major Special Funding for“Science and Tech-nology Innovation 2025”in Ningbo under Grant No.2018B10063.
The spectrum sensing model based on deep learning has achieved satisfying detection per-formence,but its robustness has not been verified.In this paper,we propose primary user adversarial attack(PUAA)to verify the rob...
关键词:spectrum sensing cognitive radio deep learning adversarial attack autoencoder DEFENSE 
DEEPNOISE:Learning Sensor and Process Noise to Detect Data Integrity Attacks in CPS
《China Communications》2021年第9期192-209,共18页Yuan Luo Long Cheng Yu Liang Jianming Fu Guojun Peng 
National Natural Science Foundation of China(No.62172308,U1626107,61972297,62172144)。
Cyber-physical systems(CPS)have been widely deployed in critical infrastructures and are vulnerable to various attacks.Data integrity attacks manipulate sensor measurements and cause control systems to fail,which are ...
关键词:cyber-physical systems anomaly detection data integrity attacks 
A Novel Method for Detecting Disk Filtration Attacks via the Various Machine Learning Algorithms被引量:1
《China Communications》2020年第4期99-108,共10页Weijun Zhu Mingliang Xu 
supported by the National Natural Science Foundation of China under grant No.U1204608,No.61472370,No.61672469 and No.61822701;the National Key R&D Program of China under grant No.2016YFB0800100.
Disk Filtration(DF) Malware can attack air-gapped computers. However, none of the existing technique can detect DF attacks. To address this problem, a method for detecting the DF attacks based on the fourteen Machine ...
关键词:air-gapped COMPUTERS DISK FILTRATION machine learning INTRUSION detection 
DDoS Attack Detection Scheme Based on Entropy and PSO-BP Neural Network in SDN被引量:8
《China Communications》2019年第7期144-155,共12页Zhenpeng Liu Yupeng He Wensheng Wang Bin Zhang 
supported by the Hebei Province Innovation Capacity Improvement Program of China under Grant No.179676278D;the Ministry of Education Fund Project of China under Grant No.2017A20004
SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN architecture network. How to accurately and effectively detect DDoS attacks has always been a diff...
关键词:software-defined NETWORKING distributed DENIAL of service ATTACKS generalized information ENTROPY particle SWARM optimization back propagation neural network ATTACK detection 
An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud被引量:3
《China Communications》2019年第4期151-171,共21页Chao Yang Yunfei Guo Hongchao Hu Wenyan Liu Yawen Wang 
supported by the National Key Research and Development Program of China (2018YFB0804004);the Foundation of the National Natural Science Foundation of China (61602509);the Foundation for Innovative Research Groups of the National Natural Science Foundation of China (61521003);the Key Technologies Research and Development Program of Henan Province of China (172102210615)
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi...
关键词:side-channel ATTACKS information LEAKAGE virtual machine migration GENETIC algorithm 
Collision Attacks against AEZ-PRF for Authenticated Encryption AEZ被引量:2
《China Communications》2018年第2期46-53,共8页Tairong Shi Chenhui Jin Jie Guan 
supported by the National Natural Science Foundation of China (Grant No.61572516, No.61272041 and No.61272488)
AEZ is an AES-based authenticated encryption submitted to the ongoing CAESAR competition and was presented at Eurocrypt2015 with AEZ v3. There are three models for AEZ, AEZ-core, AEZ-tiny and AEZ-prf. In this paper, w...
关键词:CAESAR competition authen-ticated encryption AEZ collision attacks quantum attacks 
New State Recovery Attacks on the Grain v1 Stream Cipher被引量:1
《China Communications》2016年第11期180-188,共9页Lin Ding Chenhui Jin Jie Guan Shaowu Zhang Junzhi Li Hong Wang Wei Zhao 
supported in part by the National Natural Science Foundation of China (Grant No.61202491,61272041,61272488,61402523,61602514);the Science and Technology on Communication Security Laboratory Foundation of China under Grant No.9140C110303140C11051
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key...
关键词:CRYPTANALYSIS grain v1 stream cipher weak normality order 
Mitigating ROP Attacks via ARM-Specific In-Place Instruction Randomization
《China Communications》2016年第9期208-226,共19页Yu Liang 
supported by the National Natural Science Foundation of China(Grant No.61202387,61332019 and 61373168);the National Basic Research Program of China(“973”Program)(Grant No.2014CB340600)
Defending against return-oriented programing(ROP) attacks is extremely challenging for modern operating systems.As the most popular mobile OS running on ARM,Android is even more vulnerable to ROP attacks due to its we...
关键词:software security ROP mitigation instruction randomization ARM architecture 
An Optimized Cross Correlation Power Attack of Message Blinding Exponentiation Algorithms被引量:1
《China Communications》2015年第6期22-32,共11页WAN Wunan YANG Wei CHEN Jun 
supported in part by National Natural Science Foundation of China Project(Grant No.60873216); Scientific and Technological Research Priority Projects of Sichuan Province(Grant No. 2012GZ0017)
The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding metho...
关键词:side channel attack correlationpower analysis cross correlation attacks module exponentiation. 
检索报告 对象比较 聚类工具 使用帮助 返回顶部