Replacement attacks against VM-protected applications.
Sudeep GhoshJason HiserJack W. DavidsonPublished in: VEE (2012)
Keyphrases
- virtual machine
- countermeasures
- java card
- security mechanisms
- unauthorized access
- terrorist attacks
- denial of service attacks
- watermarking scheme
- sensitive data
- malicious attacks
- cooperative
- security protocols
- chosen plaintext
- data sets
- attack scenarios
- malicious users
- security risks
- security threats
- cyber attacks
- image watermarking
- computer security
- intrusion detection