Perffuzz: Automatically generating pathological inputs

C Lemieux, R Padhye, K Sen, D Song - Proceedings of the 27th ACM …, 2018 - dl.acm.org
Performance problems in software can arise unexpectedly when programs are provided with
inputs that exhibit worst-case behavior. A large body of work has focused on diagnosing …

Attacks on the Industrial Internet of Things–Development of a multi-layer Taxonomy

S Berger, O Bürger, M Röglinger - Computers & Security, 2020 - Elsevier
Abstract The Industrial Internet of Things (IIoT) provides new opportunities to improve
process and production efficiency, which enable new business models. At the same time …

A Survey on Energy-Aware Security Mechanisms for the Internet of Things

P He, Y Zhou, X Qin - Future Internet, 2024 - mdpi.com
The Internet of Things (IoT) employs sensors and the Internet for information exchange,
enabling intelligent identification, monitoring, and management, which has deeply impacted …

An authentication scheme to defend against UDP DrDoS attacks in 5G networks

H Huang, L Hu, J Chu, X Cheng - IEEE Access, 2019 - ieeexplore.ieee.org
5th generation wireless systems are coming. While we are excited about the delay-free high
speeds 5G will bring, security problems are becoming more and more serious. Increasingly …

Detecting anomalies through sequential performance analysis in virtualized environments

CF Gonçalves, D Menasché, A Avritzer… - IEEE …, 2023 - ieeexplore.ieee.org
Virtualization enables cloud computing, allowing for server consolidation with cost reduction.
It also introduces new challenges in terms of security and isolation, which are deterrents for …

Mitigating DoS attacks in publish-subscribe IoT networks

BC Chifor, I Bica, VV Patriciu - 2017 9th International …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging subject which enables multiple applications and
requires robust security solutions. IoT architectures contribute to critical aspects of our …

CVFuzz: Detecting complexity vulnerabilities in OpenCL kernels via automated pathological input generation

W Li, Z Chen, X He, G Duan, J Sun, H Chen - Future Generation Computer …, 2022 - Elsevier
OpenCL programs typically employ complex storage models and diverse data types as well
as manifest various memory access patterns, which make it challenging to detect the …

N-Tube: Formally verified secure bandwidth reservation in path-aware internet architectures

T Weghorn, S Liu, C Sprenger… - 2022 IEEE 35th …, 2022 - ieeexplore.ieee.org
We present N-Tube, a novel, provably secure, inter-domain bandwidth reservation algorithm
that runs on a network architecture supporting path-based forwarding. N-Tube reserves …

Practical and accurate runtime application protection against dos attacks

M Elsabagh, D Fleck, A Stavrou, M Kaplan… - … Symposium on Research …, 2017 - Springer
Abstract Software Denial-of-Service (DoS) attacks use maliciously crafted inputs aiming to
exhaust available resources of the target software. These application-level DoS attacks have …

Radmin: early detection of application-level resource exhaustion and starvation attacks

M Elsabagh, D Barbará, D Fleck, A Stavrou - Research in Attacks …, 2015 - Springer
Software systems are often engineered and tested for functionality under normal rather than
worst-case conditions. This makes the systems vulnerable to denial of service attacks, where …