The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Currently, complex software (e.g. PDF readers) usually takes various inputs embedded with multiple objects (e.g. fonts, pictures), which may result in bugs. It is a challenge to generate suitable test cases to support fine-grained test to the PDF readers. Compared with the traditional blind fuzzing which does not utilize the information of input grammars, fuzzing with the model of the file format...
Recently there are more cyber-attacks in industrial networks. Stuxnet, the worm that attacked Iran nuclear power station highlights the traditional cyber threat in modern industrial infrastructures. Current process control systems (PCS) are vulnerable to cyber-attacks due to lack of means of verifying the legitimacy of control code and monitoring changes of controller devices. This paper proposed...
With the continually adopted smart grid technologies, today's power systems are becoming hybrid cyber-physical systems. The power control center relies on communication networks to collect data and issue commands to regulate power system parameters and maintain power system facilities at a safety status. However, this hybrid system also increases the risk of being compromised by cyber-attacks. If...
Networked critical infrastructures improve our lives, but they are attractive targets for adversaries. In such infrastructures, to secure sensitive data is vital, as the information system is a foundation of today??s critical infrastructures, and data security is a main concern in such systems. Cryptography is an approach for data security, but this method should be altered according to various features...
The Internet routing system as a complex system is faced with many challenges. Attacks against Border Gateway Protocol (BGP), the only wide-area routing protocol between different Autonomous Systems (AS), are increasing in number and severity. Most security mechanisms based on public key cryptography are far from deployment due to performance, trust model and other issues. Self-organization is a promising...
The inter-domain routing system consists of many interconnected autonomous systems (ASes) that configure their routing policy independently. The uncoordinated routing policy decision causes various problems such as routing oscillations, network disruption and traffic engineering failure. Although the contrast analysis on multi-AS policy configuration can detect the policy conflict, it is unacceptable...
Border gateway protocol (BGP) acts as a vital part of the global infrastructure. Attacks against BGP are increasing in number and severity. Unfortunately, most security mechanisms based on public key cryptography suffer from performance, trust model and other issues. This paper proposes a solution that takes advantages of the power-law and rich-club features of the AS-level topology, and proposes...
The current implementation of BGP protocol has a variety of vulnerabilities and weakness. Monitoring BGPpsilas behavior is an effective way to improve the security of inter-domain routing. Due to the difficulty of obtaining routing tables from autonomous systems, a packet-based model for detecting routing anomalies is presented. This model contains data collectors, anomaly detection engine, routing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.