A Co-Design Adaptive Defense Scheme With Bounded Security Damages Against Heartbleed-Like Attacks.
Zhisheng HuPing ChenMinghui ZhuPeng LiuPublished in: IEEE Trans. Inf. Forensics Secur. (2021)
Keyphrases
- chosen plaintext
- network security
- defense mechanisms
- security problems
- security threats
- intrusion detection
- security mechanisms
- computer security
- security breaches
- cyber attacks
- cyber defense
- countermeasures
- information security
- security risks
- security flaws
- security measures
- security issues
- security protocols
- authentication scheme
- java card
- denial of service attacks
- stream cipher
- access control
- security model
- security requirements
- malicious users
- dos attacks
- ddos attacks
- security vulnerabilities
- protection schemes
- malicious attacks
- protection scheme
- authentication protocol
- smart card
- intrusion detection system
- intrusion detection and prevention
- secret key
- smart grid
- key distribution
- security policies
- fault injection
- identity theft
- security analysis
- cyber security
- cryptographic protocols
- buffer overflow
- key management
- key agreement protocol
- information warfare
- diffie hellman