Authentication Bypass and Remote Escalated I/O Command Attacks.
Ryan GrandgenettWilliam R. MahoneyRobin A. GandhiPublished in: CISR (2015)
Keyphrases
- security mechanisms
- semi fragile watermarking
- software vendors
- detect malicious
- digital watermarking
- control center
- input output
- watermarking scheme
- security protocols
- image authentication
- security issues
- authentication protocol
- main memory
- biometric authentication
- access control
- user authentication
- authentication scheme
- file system
- real time
- biometric template
- smart card
- operating system
- watermarking technique
- tcp ip
- high level
- case study
- security requirements
- watermarking algorithm
- wireless networks
- control system