Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks.
Tegjyot Singh SethiMehmed M. KantardzicJoung Woo RyuPublished in: CoRR (2018)
Keyphrases
- security vulnerabilities
- buffer overflow
- security risks
- denial of service
- security threats
- security problems
- dos attacks
- security mechanisms
- computer security
- security protocols
- information security
- intrusion detection
- security measures
- security issues
- denial of service attacks
- java card
- network security
- penetration testing
- security breaches
- security flaws
- fault injection
- support vector
- malicious attacks
- security requirements
- countermeasures
- stream cipher
- chosen plaintext
- risk assessment
- training set
- cyber attacks
- decision trees
- cryptographic protocols
- key management
- unauthorized access
- discrimination aware
- training data
- smart card
- malicious users
- insider attacks
- data corruption
- cryptographic algorithms
- access control
- feature selection
- anomaly detection
- information leakage
- data security
- biometric template
- secure routing
- watermarking scheme
- sensitive data
- intrusion prevention
- intrusion detection and prevention