Radmin: early detection of application-level resource exhaustion and starvation attacks

M Elsabagh, D Barbará, D Fleck, A Stavrou - Research in Attacks …, 2015 - Springer
Software systems are often engineered and tested for functionality under normal rather than
worst-case conditions. This makes the systems vulnerable to denial of service attacks, where …

On early detection of application-level resource exhaustion and starvation

M Elsabagh, D Barbará, D Fleck, A Stavrou - Journal of Systems and …, 2018 - Elsevier
Software systems are often engineered and tested for functionality under normal rather than
worst-case conditions. This makes the systems vulnerable to denial-of-service attacks …

Why software dos is hard to fix: Denying access in embedded android platforms

R Johnson, M Elsabagh, A Stavrou - … , ACNS 2016, Guildford, UK, June 19 …, 2016 - Springer
A new class of software Denial of Service (DoS) attacks against Android platforms was
recently discovered, where the attacks can force the victim device unresponsive, target and …

[PDF][PDF] 协议抗拒绝服务攻击性自动化证明

孟博, 黄伟, 王德军, 邵飞 - 通信学报, 2012 - infocomm-journal.com
首先从攻击者上下文与进程表达式2 个方面对标准应用PI 演算进行扩展,
然后从协议状态的角度, 应用扩展后的应用PI 演算对协议抗拒绝服务攻击性进行建模 …

Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant

H Patel, DC Jinwala - Proceedings of the 6th ACM India Computing …, 2013 - dl.acm.org
With the growing concerns on the information security and the capabilities of an attacker,
Denial of Service (DoS) attacks have become one of the most serious and potent form of …

Cyber threat screening using a queuing-based game-theoretic approach

A Bhattacharya, SD Bopardikar, S Chatterjee… - Journal of Information …, 2019 - JSTOR
Dynamic and uncertain security environments, such as cyber systems, often involve strategic
interactions among multiple decision-making agents. In this paper, the authors consider a …

[PDF][PDF] Automated Proof of Resistance of Denial of Service Attacks Using Event with Theorem Prover.

B Meng, W Huang, Z Li - J. Comput., 2013 - jcomputers.us
The huge damage of denial of service attacks in security protocols attracts researchers'
attention and effort to analysis, verification and prevention of denial of service attacks. In …

[HTML][HTML] Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is np-complete

P Adao, P Mateus, L Vigano - Theoretical Computer Science, 2014 - Elsevier
Guessing attacks in security protocols arise when honest agents make use of data easily
guessable by an intruder, such as passwords generated from a small dictionary. A way to …

[引用][C] 一种协议抗拒绝服务的形式化分析方法研究

金大鹏, 林宏刚 - 成都信息工程学院学报, 2015

[图书][B] Abstractions and Algorithms for Specializing Dynamic Program Analysis and Random Fuzz Testing

RR Padhye - 2020 - search.proquest.com
Software bugs affect the security, performance, and reliability of critical systems that much of
our society depends on. In practice, the predominant method of ensuring software quality is …