Construction of Overflow Attacks Based on Attack Element and Attack Template.
Ning ZhuXingyuan ChenYongfu ZhangPublished in: CIS (2011)
Keyphrases
- countermeasures
- buffer overflow
- attack detection
- malicious attacks
- malicious users
- power analysis
- differential power analysis
- denial of service attacks
- data corruption
- attack scenarios
- cyber attacks
- fault injection
- digital watermark
- normal traffic
- security vulnerabilities
- dos attacks
- ddos attacks
- security risks
- smart card
- normal behavior
- security measures
- digital images
- network intrusion
- injection attacks
- network intrusions
- network anomaly detection
- attack graphs
- input image
- detecting malicious
- template matching
- network attacks
- information security
- malicious nodes
- block cipher