Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Jean-Sébastien CoronCraig GentryShai HaleviTancrède LepointHemanta K. MajiEric MilesMariana RaykovaAmit SahaiMehdi TibouchiPublished in: CRYPTO (1) (2015)
Keyphrases
- low level
- high level
- higher level
- malicious attacks
- middle level
- visual cues
- countermeasures
- denial of service attacks
- low level features
- lower level
- visual information
- malicious users
- terrorist attacks
- security threats
- cyber attacks
- computer security
- security mechanisms
- mid level
- security protocols
- figure ground
- traffic analysis
- intrusion detection system
- visual features
- signal processing
- database systems
- attack detection
- information systems