Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks.
John P. McDermottPublished in: Workshop on New Security Paradigms (1998)
Keyphrases
- countermeasures
- future directions
- malicious users
- traffic analysis
- watermarking algorithm
- database integrity
- terrorist attacks
- watermarking scheme
- computer security
- security threats
- security mechanisms
- trusted computing
- malicious attacks
- attack detection
- chosen plaintext
- data corruption
- data sets
- malicious code
- cyber attacks
- security protocols
- information security