Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks.
Evgenios M. KornaropoulosCharalampos PapamanthouRoberto TamassiaPublished in: IEEE Symposium on Security and Privacy (2021)
Keyphrases
- information leakage
- security threats
- security problems
- security mechanisms
- security measures
- security protocols
- java card
- encryption decryption
- cyber attacks
- computer security
- security vulnerabilities
- security breaches
- fault injection
- chosen plaintext
- stream cipher
- security risks
- denial of service attacks
- countermeasures
- access control
- malicious attacks
- security issues
- security flaws
- personal information
- information security
- encryption scheme
- cryptographic protocols
- security requirements
- encryption key
- biometric template
- malicious users
- intrusion prevention
- buffer overflow
- cryptographic algorithms
- smart card
- network security
- key management
- intrusion detection
- identity theft
- data security
- cyber security
- unauthorized access
- attack scenarios
- watermarking scheme
- dos attacks
- security policies
- secure routing
- stepping stones
- encryption algorithm
- secret key
- intrusion detection system
- security analysis
- sensitive information
- intrusion detection and prevention