Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim …
Recent years have seen a proliferation of research on adversarial machine learning. Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …
How Hard Can It Be? Designing and Implementing a Deployable Multipath TCP Page 1 How Hard Can It Be? Designing and Implementing a Deployable Multipath TCP Costin Raiciu† …
Programmable NICs allow for better scalability to handle growing network workloads, however, providing an expressive, yet simple, abstraction to program stateful network …
T Vidas, N Christin - Proceedings of the 9th ACM symposium on …, 2014 - dl.acm.org
The large amounts of malware, and its diversity, have made it necessary for the security community to use automated dynamic analysis systems. These systems often rely on …
This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and protocol …
D Wagner, P Soto - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
We examine several host-based anomaly detection systems and study their security against evasion attacks. First, we introduce the notion of a mimicry attack, which allows a …
S Singh, C Estan, G Varghese, S Savage - OSDI, 2004 - usenix.org
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivity and …
Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental …