• McEliece

  • Referenced in 264 articles [sw02076]
  • Practical power analysis attacks on software implementations of McEliece. The McEliece public-key cryptosystem ... Therefore, their vulnerability and robustness against physical attacks, e.g., state-of-the-art power analysis...
  • CSparse

  • Referenced in 238 articles [sw20382]
  • solution of sparse systems of linear equations. Attacking these problems efficiently requires an in-depth ... data structures found in sparse matrix software libraries. Here, Davis presents the fundamentals of sparse...
  • M-TREE

  • Referenced in 14 articles [sw02565]
  • immune to both physical and software attacks. Despite a number of secure processor designs have...
  • LBlock

  • Referenced in 47 articles [sw06569]
  • cryptanalysis, impossible differential cryptanalysis and related-key attacks etc. Furthermore, LBlock can be implemented efficiently ... only in hardware environments but also in software platforms such as 8-bit microcontroller...
  • SIDH

  • Referenced in 16 articles [sw17952]
  • SIDH Library is a fast and portable software library that implements a new suite ... provide 128 bits of security against attackers running a large-scale quantum computer ... Diffie-Hellman software that is fully protected against timing and cache attacks: all operations ... constant-time) supersingular isogeny Diffie-Hellman software...
  • SOSEMANUK

  • Referenced in 15 articles [sw09724]
  • based guess and determine attack on SOSEMANUK. SOSEMANUK is a software-oriented stream cipher proposed ... calculated byte-oriented. Hence an attacker can observe SOSEMANUK from the view of byte units...
  • CindyJS

  • Referenced in 9 articles [sw15162]
  • Project aims at the development of a software platform and its mathematical foundation that allows ... demonstration. The project attacks both the mathematical and the software related aspects of such...
  • Itubee

  • Referenced in 6 articles [sw19368]
  • competitive block cipher on 8-bit software platforms in terms of energy consumption. Also, less ... have shown that the attacks which are effective on software oriented lightweight block ciphers...
  • Rowhammer.js

  • Referenced in 2 articles [sw42336]
  • Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. A fundamental assumption in software security ... affected systems, e.g., privilege escalation attacks. All studies and attacks related to Rowhammer...
  • SIFT

  • Referenced in 1 article [sw20577]
  • buffer overflow and code injection attacks. Software DIFT implementations incur very high performance overhead, while...
  • Devign

  • Referenced in 3 articles [sw40145]
  • crucial to protect the software systems from attacks for cyber security. It is especially important...
  • ADTool

  • Referenced in 4 articles [sw11973]
  • Security Analysis with Attack–Defense Trees. ADTool is free, open source software assisting graphical modeling...
  • OpenFlowSIA

  • Referenced in 1 article [sw38854]
  • optimized protection scheme for software-defined networks from flooding attacks. In this paper, we propose ... protection mechanism (OpenFlowSIA) for Software-Defined Networks from flooding attacks (Distributed Denial-of-Service) based ... network resources under flooding attacks in the Software-Defined Networks...
  • LIFT

  • Referenced in 3 articles [sw20596]
  • Detecting Security Attacks. Computer security is severely threatened by software vulnerabilities. Prior work shows that ... detect a wide range of security attacks. However, current information flow tracking systems ... overheads. This paper proposes a low overhead, software-only information flow tracking system, called LIFT ... optimizations for detecting various types of security attacks without requiring any hardware changes. More specifically...
  • SecurITree

  • Referenced in 1 article [sw22311]
  • easy to use software package for attack tree-based threat risk analysis . It runs ... explore all of the attack paths quickly and accurately - a software tool is required. SecurITree...
  • Rabbit

  • Referenced in 18 articles [sw08372]
  • characterized by a high performance in software with a measured encryption/decryption speed of 3.7 clock ... cryptanalysis of Rabbit did not reveal an attack better than exhaustive key search...
  • Themida

  • Referenced in 1 article [sw31727]
  • software protection system. Software protectors where created to keep an attacker from directly inspecting ... modifying a compiled application. A software protector is like a shield that keeps an application ... encrypted and protected against possible attacks. When a protected application is going ... using a Software Protector are: Protect an application against piracy. Prevents attackers from studying...
  • RAPPOR

  • Referenced in 33 articles [sw42193]
  • crowdsourcing statistics from end-user client software, anonymously, with strong privacy guarantees. In short, RAPPORs ... properties in the face of different attack models, and, finally, gives results of its application...
  • TDDAD

  • Referenced in 2 articles [sw38851]
  • defense scheme against ddos attack on SDN controller. Software defined network ... easily disrupted by a new DDoS attack which triggers enormous (mathrm{Packet_IN}) messages. Since...
  • ASPIER

  • Referenced in 6 articles [sw09852]
  • methodology for software model checking with a domain-specific protocol and symbolic attacker model...