Protecting Legitimate SEI Security Approaches from Phase-Based Obfuscation Attacks.
Joshua H. TylerDonald R. ReisingMohamed K. M. FadulMina SartipiPublished in: ICC (2023)
Keyphrases
- access control
- security threats
- security vulnerabilities
- cyber attacks
- malicious users
- unauthorized access
- denial of service attacks
- security problems
- java card
- cryptographic protocols
- static analysis
- security issues
- stream cipher
- intrusion detection
- information security
- security measures
- network security
- security policies
- countermeasures
- encryption scheme
- malware detection
- security requirements
- dos attacks
- data security
- security protocols
- computer security
- security mechanisms