[HTML][HTML] Evaluation of resource exhaustion attacks against wireless mobile devices

V Desnitsky, I Kotenko, D Zakoldaev - Electronics, 2019 - mdpi.com
… to model and analyze energy resources exhaustion attacks, including analysis of possible
types of attacks on cyber-physical devices, an intruder model and … and evaluation of attacks. …

Towards Automated Attack Discovery in SDN Controllers Through Formal Verification

B Yuan, C Zhang, J Ren, Q Chen, B Xu… - … on Network and …, 2024 - ieeexplore.ieee.org
… are also widely researched to affect the control plane, among which the packet-in messages
are often abused to launch resource exhaustion attacks against switches and controllers [14]…

Protecting RESTful IoT devices from battery exhaustion DoS attacks

S Hristozov, M Huber, G Sigl - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
attack detection algorithm is executed on per Requester basis on the Backend. For the formal
… EWMA algorithms for detecting and throttling battery exhaustion attacks through simulation…

Automating the early detection of security design flaws

K Tuma, L Sion, R Scandariato, K Yskout - … Conference on Model Driven …, 2020 - dl.acm.org
… [9] introduce a catalog of so called ‘spoiled patterns’ and automatically detect them in
architecture models. To this aim, they extend an existing OWL ontology. Their approach suggests …

[HTML][HTML] Automatic verification and execution of cyber attack on iot devices

FL Færøy, MM Yamin, A Shukla, B Katt - Sensors, 2023 - mdpi.com
… Comparing to the above mentioned work in our study we first formally model and verify
different IoT threats and then automatically execute the attack on IoT devices with minimal human …

Resource-bounded intruders in denial of service attacks

AA Urquiza, MA AlTurki, M Kanovich… - 2019 IEEE 32nd …, 2019 - ieeexplore.ieee.org
attack from existing literature. In [31] a DoS attack is viewed as “the resource exhaustion
attack… instances of a protocol, causes a victim to exhaust his resources”. According to [9], a DoS “…

Modelling load-changing attacks in cyber-physical systems

L Arnaboldi, RM Czekster, C Morisset… - Electronic Notes in …, 2020 - Elsevier
… We showcase our modelling approach in the scenario of a power supplier (eg power plant)
… We demonstrate how our modelling approach can quantify the impact of a botnet attack and …

Survey of transient execution attacks and their mitigations

W Xiong, J Szefer - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
… transient execution attacks and uses them to evaluate the feasibility of the different attacks.
This survey especially considers both existing attacks and potential new attacks suggested by …

Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach

Q Zou, A Singhal, X Sun, P Liu - Journal of computer security, 2022 - content.iospress.com
… ; 2) We propose to use protocol fuzzing to automatically generate high-quality network traffic
… is resource exhaustion DoS attacks. The network traffic can be used to detect such attacks, …

Formal fault injection vulnerability detection in binaries: a software process and hardware validation

N Jafri - 2019 - theses.hal.science
… This demonstrates that: not all software-based vulnerabilities can be reproduced in hardware;
prior conjectures on the fault model for electromagnetic pulse attacks may not be accurate; …