Letting applications operate through attacks launched from compromised drivers.
Shengzhi ZhangPeng LiuPublished in: AsiaCCS (2012)
Keyphrases
- malicious attacks
- countermeasures
- key factors
- watermarking scheme
- security flaws
- terrorist attacks
- information systems
- denial of service attacks
- traffic analysis
- java card
- digital image watermarking
- security vulnerabilities
- security risks
- security threats
- security protocols
- security mechanisms
- digital images
- cooperative
- web pages