Attacks Generation by Detecting Attack Surfaces.
Samir OuchaniGabriele LenziniPublished in: ANT/SEIT (2014)
Keyphrases
- detecting malicious
- countermeasures
- malicious activities
- misuse detection
- malicious attacks
- malicious users
- attack detection
- network intrusion detection systems
- network intrusion
- intrusion detection
- differential power analysis
- intrusion detection system
- power analysis
- denial of service attacks
- anomaly detection
- detect malicious
- ddos attacks
- data corruption
- fault injection
- cyber attacks
- block cipher
- three dimensional
- injection attacks
- attack scenarios
- security measures
- information security
- dos attacks
- network attacks
- free form
- security vulnerabilities
- identity theft
- digital watermark
- defense mechanisms
- java card
- network anomaly detection
- buffer overflow
- network intrusion detection
- surface reconstruction
- end hosts
- range data