搜索结果: 1-15 共查到“vulnerabilities”相关记录25条 . 查询时间(0.061 秒)
Materials scientists drill down to vulnerabilities in human tooth decay(图)
Materials scientists drill down vulnerabilities human tooth decay
2020/7/10
Researchers at Northwestern University have cracked one of the secrets of tooth decay. In a new study of human enamel, the materials scientists are the first to identify a small number of impurities t...
Recently, the NIST launched a competition for lightweight cryptography and a large number of ciphers are expected to be studied and analyzed under this competition. Apart from the classical security, ...
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering
side-channel analysis differential plaintext attack SCADPA
2018/3/5
Lightweight block ciphers rely on simple operations to allow compact implementation. Thanks to its efficiency, bit permutation has emerged as an optimal choice for state-wise diffusion. It can be impl...
Early Detection and Analysis of Leakage Abuse Vulnerabilities
cryptanalysis efficiently searchable encryption encrypted databases
2017/11/1
In order to be useful in the real world, efficient cryptographic constructions often reveal, or ``leak,'' more information about their plaintext than one might desire. Up until now, the approach for a...
Researchers Find Vulnerabilities in iPhone,iPad Operating System
Researchers Vulnerabilities iPhone iPad Operating System
2016/9/12
Recent literature on iOS security has focused on the malicious potential of third-party applications, demonstrating how developers can bypass application vetting and code-level protections. In additio...
Researchers find vulnerabilities in cars connected to smartphones
Researchers vulnerabilities cars connected smartphones
2016/9/12
Many of today’s automobiles leave the factory with secret passengers: prototype software features that are disabled but that can be unlocked by clever drivers.
In what is believed to be the first com...
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
Towards Automated Detection Buffer Overrun Vulnerabilities
2016/5/24
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection of buffer overruns as...
Static Detection of Security Vulnerabilities in Scripting Languages
Static Detection Security Vulnerabilities Scripting Languages
2016/5/24
We present a static analysis algorithm for detecting security vulnerabilities in PHP, a popular server-side scripting language for building web applications. Our analysis employs a novel three-tier ar...
Indistinguishability obfuscation is a central primitive in cryptography. Security of existing multilinear maps constructions on which current obfuscation candidates are based is poorly understood. In ...
Vulnerabilities of ``McEliece in the World of Escher"
Information Set Decoding Code-based Cryptography McEliece
2015/12/22
Recently, Gligoroski et al. proposed code-based encryption and signature
schemes using list decoding, blockwise triangular private keys, and a
nonuniform error pattern based on “generalized error se...
Researchers Find Vulnerabilities in Use of Certificates for Web Security
Researchers Vulnerabilities in Use of Certificates Web Security
2015/11/12
Consumers use the Internet for banking, emailing, shopping and much more nowadays. With so much personal and private information being transmitted over the Web, Internet users must be able to rely on ...
Busting frame busting: a study of clickjacking vulnerabilities at popular sites
popular sites clickjacking vulnerabilities
2015/8/5
Web framing attacks such as clickjacking use iframes to hijack a user's web session. The most common defense, called frame busting, prevents a site from functioning when loaded inside a frame. We stud...
The Vulnerabilities of Orphaned Children Participating in Research: A Critical Review and Factors for Consideration for Participation in Biomedical and Behavioral Research
orphaned children research Kenya
2014/12/11
Orphans are a subpopulation with a unique set of additional vulnerabilities. Increasing focus on children’s rights, pediatric global health, and pediatric research makes it imperative to recognize and...
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Key Correlation Plaintext Recovery
2014/3/11
The first three bytes of the RC4 key in WPA are public as they are derived from the public parameter IV, and this derivation leads to a strong mutual dependence between the first two bytes of the RC4 ...
Key Vulnerabilities and Limitations in the Management of Hazardous Waste and Its Disposal: A Checklist Assessment Tool
Hazardous Waste Vulnerabilities Checklist Environmental Crime
2013/3/13
From an environmental protection perspective, the crucial issues pertaining to the policing of hazardous waste relate to both the vulnerabilities and limitations of current practices, and the potentia...