simuBits: Pool Security Verification of Novel Mining Attacks.
Zunlong ZhouWen ChenLinrui LiYilin ZhangPublished in: ProvSec (2023)
Keyphrases
- java card
- cryptographic protocols
- security threats
- smart card
- security problems
- fault injection
- countermeasures
- security mechanisms
- high security
- security measures
- computer security
- security protocols
- cyber attacks
- security breaches
- information security
- security flaws
- security risks
- static analysis
- denial of service attacks
- stream cipher
- security issues
- malicious attacks
- security vulnerabilities
- chosen plaintext
- data mining techniques
- security requirements
- intrusion detection
- security policies
- network security
- security model
- data mining
- malicious users
- information leakage
- identity theft
- unauthorized access
- resource constrained
- biometric template
- buffer overflow
- access control
- security systems
- model checking
- watermarking scheme
- frequent patterns
- security analysis
- authentication scheme
- itemsets
- cryptographic algorithms
- integrity verification
- authentication protocol
- intrusion prevention