-
McEliece
- Referenced in 264 articles
[sw02076]
- Practical power analysis attacks on software implementations of McEliece. The McEliece public-key cryptosystem ... Therefore, their vulnerability and robustness against physical attacks, e.g., state-of-the-art power analysis...
-
CSparse
- Referenced in 238 articles
[sw20382]
- solution of sparse systems of linear equations. Attacking these problems efficiently requires an in-depth ... data structures found in sparse matrix software libraries. Here, Davis presents the fundamentals of sparse...
-
M-TREE
- Referenced in 14 articles
[sw02565]
- immune to both physical and software attacks. Despite a number of secure processor designs have...
-
LBlock
- Referenced in 47 articles
[sw06569]
- cryptanalysis, impossible differential cryptanalysis and related-key attacks etc. Furthermore, LBlock can be implemented efficiently ... only in hardware environments but also in software platforms such as 8-bit microcontroller...
-
SIDH
- Referenced in 16 articles
[sw17952]
- SIDH Library is a fast and portable software library that implements a new suite ... provide 128 bits of security against attackers running a large-scale quantum computer ... Diffie-Hellman software that is fully protected against timing and cache attacks: all operations ... constant-time) supersingular isogeny Diffie-Hellman software...
-
SOSEMANUK
- Referenced in 15 articles
[sw09724]
- based guess and determine attack on SOSEMANUK. SOSEMANUK is a software-oriented stream cipher proposed ... calculated byte-oriented. Hence an attacker can observe SOSEMANUK from the view of byte units...
-
CindyJS
- Referenced in 9 articles
[sw15162]
- Project aims at the development of a software platform and its mathematical foundation that allows ... demonstration. The project attacks both the mathematical and the software related aspects of such...
-
Itubee
- Referenced in 6 articles
[sw19368]
- competitive block cipher on 8-bit software platforms in terms of energy consumption. Also, less ... have shown that the attacks which are effective on software oriented lightweight block ciphers...
-
Rowhammer.js
- Referenced in 2 articles
[sw42336]
- Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. A fundamental assumption in software security ... affected systems, e.g., privilege escalation attacks. All studies and attacks related to Rowhammer...
-
SIFT
- Referenced in 1 article
[sw20577]
- buffer overflow and code injection attacks. Software DIFT implementations incur very high performance overhead, while...
-
Devign
- Referenced in 3 articles
[sw40145]
- crucial to protect the software systems from attacks for cyber security. It is especially important...
-
ADTool
- Referenced in 4 articles
[sw11973]
- Security Analysis with Attack–Defense Trees. ADTool is free, open source software assisting graphical modeling...
-
OpenFlowSIA
- Referenced in 1 article
[sw38854]
- optimized protection scheme for software-defined networks from flooding attacks. In this paper, we propose ... protection mechanism (OpenFlowSIA) for Software-Defined Networks from flooding attacks (Distributed Denial-of-Service) based ... network resources under flooding attacks in the Software-Defined Networks...
-
LIFT
- Referenced in 3 articles
[sw20596]
- Detecting Security Attacks. Computer security is severely threatened by software vulnerabilities. Prior work shows that ... detect a wide range of security attacks. However, current information flow tracking systems ... overheads. This paper proposes a low overhead, software-only information flow tracking system, called LIFT ... optimizations for detecting various types of security attacks without requiring any hardware changes. More specifically...
-
SecurITree
- Referenced in 1 article
[sw22311]
- easy to use software package for attack tree-based threat risk analysis . It runs ... explore all of the attack paths quickly and accurately - a software tool is required. SecurITree...
-
Rabbit
- Referenced in 18 articles
[sw08372]
- characterized by a high performance in software with a measured encryption/decryption speed of 3.7 clock ... cryptanalysis of Rabbit did not reveal an attack better than exhaustive key search...
-
Themida
- Referenced in 1 article
[sw31727]
- software protection system. Software protectors where created to keep an attacker from directly inspecting ... modifying a compiled application. A software protector is like a shield that keeps an application ... encrypted and protected against possible attacks. When a protected application is going ... using a Software Protector are: Protect an application against piracy. Prevents attackers from studying...
-
RAPPOR
- Referenced in 33 articles
[sw42193]
- crowdsourcing statistics from end-user client software, anonymously, with strong privacy guarantees. In short, RAPPORs ... properties in the face of different attack models, and, finally, gives results of its application...
-
TDDAD
- Referenced in 2 articles
[sw38851]
- defense scheme against ddos attack on SDN controller. Software defined network ... easily disrupted by a new DDoS attack which triggers enormous (mathrm{Packet_IN}) messages. Since...
-
ASPIER
- Referenced in 6 articles
[sw09852]
- methodology for software model checking with a domain-specific protocol and symbolic attacker model...