Gotowa bibliografia na temat „White-box attack”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „White-box attack”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "White-box attack"
Chen, Jinghui, Dongruo Zhou, Jinfeng Yi i Quanquan Gu. "A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks". Proceedings of the AAAI Conference on Artificial Intelligence 34, nr 04 (3.04.2020): 3486–94. http://dx.doi.org/10.1609/aaai.v34i04.5753.
Pełny tekst źródłaJosse, Sébastien. "White-box attack context cryptovirology". Journal in Computer Virology 5, nr 4 (2.08.2008): 321–34. http://dx.doi.org/10.1007/s11416-008-0097-x.
Pełny tekst źródłaPorkodi, V., M. Sivaram, Amin Salih Mohammed i V. Manikandan. "Survey on White-Box Attacks and Solutions". Asian Journal of Computer Science and Technology 7, nr 3 (5.11.2018): 28–32. http://dx.doi.org/10.51983/ajcst-2018.7.3.1904.
Pełny tekst źródłaALSHEKH, MOKHTAR, i KÖKSAL ERENTÜRK. "DEFENSE AGAINST WHITE BOX ADVERSARIAL ATTACKS IN ARABIC NATURAL LANGUAGE PROCESSING (ANLP)". International Journal of Advanced Natural Sciences and Engineering Researches 7, nr 6 (25.07.2023): 151–55. http://dx.doi.org/10.59287/ijanser.1149.
Pełny tekst źródłaPark, Hosung, Gwonsang Ryu i Daeseon Choi. "Partial Retraining Substitute Model for Query-Limited Black-Box Attacks". Applied Sciences 10, nr 20 (14.10.2020): 7168. http://dx.doi.org/10.3390/app10207168.
Pełny tekst źródłaZhou, Jie, Jian Bai i Meng Shan Jiang. "White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode". Security and Communication Networks 2020 (19.11.2020): 1–10. http://dx.doi.org/10.1155/2020/8881116.
Pełny tekst źródłaLIN, Ting-Ting, i Xue-Jia LAI. "Efficient Attack to White-Box SMS4 Implementation". Journal of Software 24, nr 8 (17.01.2014): 2238–49. http://dx.doi.org/10.3724/sp.j.1001.2013.04356.
Pełny tekst źródłaZhang, Sicheng, Yun Lin, Zhida Bao i Jiangzhi Fu. "A Lightweight Modulation Classification Network Resisting White Box Gradient Attacks". Security and Communication Networks 2021 (12.10.2021): 1–10. http://dx.doi.org/10.1155/2021/8921485.
Pełny tekst źródłaGao, Xianfeng, Yu-an Tan, Hongwei Jiang, Quanxin Zhang i Xiaohui Kuang. "Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation". Applied Sciences 9, nr 11 (3.06.2019): 2286. http://dx.doi.org/10.3390/app9112286.
Pełny tekst źródłaJiang, Yi, i Dengpan Ye. "Black-Box Adversarial Attacks against Audio Forensics Models". Security and Communication Networks 2022 (17.01.2022): 1–8. http://dx.doi.org/10.1155/2022/6410478.
Pełny tekst źródłaRozprawy doktorskie na temat "White-box attack"
Koski, Alexander. "Randomly perturbing the bytecode of white box cryptography implementations in an attempt to mitigate side-channel attacks". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-273928.
Pełny tekst źródłaDenna studie tar ett steg längre i att skapa ett verktyg som automatiskt höjer säkerheten på kryptografiska implementationer. I white box-kryptografi är krypteringsnyckeln som används redan gömd inuti den valda krypteringsalgoritmen. En användare med onda intentioner kan vilja försöka att extrahera denna gömda krypteringsnyckel genom att utföra en typ utav side-channel -attack, differential computational analys, vilket flera white box-implementationer är sårbara för. Tekniken för att öka säkerheten hos dessa white box-implementationer som utforskas i denna studie går ut på att slumpmässigt, med olika sannolikheter störa white box-implementationen genom att addera värdet ett (1) till en godtycklig variabel mitt under programmets körning. Detta sänker korrektheten på outputen från alla de tre testade white box-implementationerna olika mycket, men vissa störningar kan utföras och fortfarande resultera i hög korrekthet. Att sätta in sådana störningar i white box-implementationerna har ingen större inverkan på dess totala exekveringstid. Utav 100 000 möjliga ställen att sätta in en störning på valdes 25 utav dessa att undersökas vidare. I ett utav dessa fall ökade säkerheten på white box-implementationen, men i fyra liknande fall minskade säkerheten, annars på övriga störningspunkter fanns det inga tecken på en förändring i säkerhet. Ett mer sofistikerat sätt att identifiera de bästa störningspunkterna på behöver därför utredas för att bygga vidare på detta arbete med att öka säkerheten hos kryptografiska implementationer genom att utsätta dem för slumpmässiga störningar och samtidigt kunna hålla hög korrekthet i programmets resultat.
Marion, Damien. "Multidimensionality of the models and the data in the side-channel domain". Thesis, Paris, ENST, 2018. http://www.theses.fr/2018ENST0056/document.
Pełny tekst źródłaSince the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun, entitled "Differential Power Analysis", the side-channel attacks have been proved to be efficient ways to attack cryptographic algorithms. Indeed, it has been revealed that the usage of information extracted from the side-channels such as the execution time, the power consumption or the electromagnetic emanations could be used to recover secret keys. In this context, we propose first, to treat the problem of dimensionality reduction. Indeed, since twenty years, the complexity and the size of the data extracted from the side-channels do not stop to grow. That is why the reduction of these data decreases the time and increases the efficiency of these attacks. The dimension reduction is proposed for complex leakage models and any dimension. Second, a software leakage assessment methodology is proposed ; it is based on the analysis of all the manipulated data during the execution of the software. The proposed methodology provides features that speed-up and increase the efficiency of the analysis, especially in the case of white box cryptography
Vivek, B. S. "Towards Learning Adversarially Robust Deep Learning Models". Thesis, 2019. https://etd.iisc.ac.in/handle/2005/4488.
Pełny tekst źródłaCzęści książek na temat "White-box attack"
Cai, Jinghui, Boyang Wang, Xiangfeng Wang i Bo Jin. "Accelerate Black-Box Attack with White-Box Prior Knowledge". W Intelligence Science and Big Data Engineering. Big Data and Machine Learning, 394–405. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36204-1_33.
Pełny tekst źródłaMeng, Lubin, Chin-Teng Lin, Tzyy-Ping Jung i Dongrui Wu. "White-Box Target Attack for EEG-Based BCI Regression Problems". W Neural Information Processing, 476–88. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36708-4_39.
Pełny tekst źródłaZeyad, Mohamed, Houssem Maghrebi, Davide Alessio i Boris Batteux. "Another Look on Bucketing Attack to Defeat White-Box Implementations". W Constructive Side-Channel Analysis and Secure Design, 99–117. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16350-1_7.
Pełny tekst źródłaLucas, Keane, Mahmood Sharif, Lujo Bauer, Michael K. Reiter i Saurabh Shintre. "Deceiving ML-Based Friend-or-Foe Identification for Executables". W Advances in Information Security, 217–49. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16613-6_10.
Pełny tekst źródłaAmadori, Alessandro, Wil Michiels i Peter Roelse. "A DFA Attack on White-Box Implementations of AES with External Encodings". W Lecture Notes in Computer Science, 591–617. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38471-5_24.
Pełny tekst źródłaLiu, Haohan, Xingquan Zuo, Hai Huang i Xing Wan. "Saliency Map-Based Local White-Box Adversarial Attack Against Deep Neural Networks". W Artificial Intelligence, 3–14. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20500-2_1.
Pełny tekst źródłaAlpirez Bock, Estuardo, Chris Brzuska, Wil Michiels i Alexander Treff. "On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography". W Applied Cryptography and Network Security, 103–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93387-0_6.
Pełny tekst źródłaBiryukov, Alex, i Aleksei Udovenko. "Attacks and Countermeasures for White-box Designs". W Lecture Notes in Computer Science, 373–402. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03329-3_13.
Pełny tekst źródłaLepoint, Tancrède, Matthieu Rivain, Yoni De Mulder, Peter Roelse i Bart Preneel. "Two Attacks on a White-Box AES Implementation". W Selected Areas in Cryptography -- SAC 2013, 265–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43414-7_14.
Pełny tekst źródłaBiryukov, Alex, i Aleksei Udovenko. "Dummy Shuffling Against Algebraic Attacks in White-Box Implementations". W Lecture Notes in Computer Science, 219–48. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77886-6_8.
Pełny tekst źródłaStreszczenia konferencji na temat "White-box attack"
Mesbah, Abdelhak, Mohamed Mezghiche i Jean-Louis Lanet. "Persistent fault injection attack from white-box to black-box". W 2017 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B). IEEE, 2017. http://dx.doi.org/10.1109/icee-b.2017.8192164.
Pełny tekst źródłaZhang, Chaoning, Philipp Benz, Adil Karjauv, Jae Won Cho, Kang Zhang i In So Kweon. "Investigating Top-k White-Box and Transferable Black-box Attack". W 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2022. http://dx.doi.org/10.1109/cvpr52688.2022.01466.
Pełny tekst źródłaLi, Yufei, Zexin Li, Yingfan Gao i Cong Liu. "White-Box Multi-Objective Adversarial Attack on Dialogue Generation". W Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Stroudsburg, PA, USA: Association for Computational Linguistics, 2023. http://dx.doi.org/10.18653/v1/2023.acl-long.100.
Pełny tekst źródłaXiao, Chaowei, Bo Li, Jun-yan Zhu, Warren He, Mingyan Liu i Dawn Song. "Generating Adversarial Examples with Adversarial Networks". W Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/543.
Pełny tekst źródłaJia, Yin, TingTing Lin i Xuejia Lai. "A generic attack against white box implementation of block ciphers". W 2016 International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE, 2016. http://dx.doi.org/10.1109/cits.2016.7546449.
Pełny tekst źródłaAzadmanesh, Maryam, Behrouz Shahgholi Ghahfarokhi i Maede Ashouri Talouki. "A White-Box Generator Membership Inference Attack Against Generative Models". W 2021 18th International ISC Conference on Information Security and Cryptology (ISCISC). IEEE, 2021. http://dx.doi.org/10.1109/iscisc53448.2021.9720436.
Pełny tekst źródłaWang, Xiying, Rongrong Ni, Wenjie Li i Yao Zhao. "Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios". W 2021 IEEE International Conference on Image Processing (ICIP). IEEE, 2021. http://dx.doi.org/10.1109/icip42928.2021.9506273.
Pełny tekst źródłaBetz, Patrick, Christian Meilicke i Heiner Stuckenschmidt. "Adversarial Explanations for Knowledge Graph Embeddings". W Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/391.
Pełny tekst źródłaAmadori, Alessandro, Wil Michiels i Peter Roelse. "Automating the BGE Attack on White-Box Implementations of AES with External Encodings". W 2020 IEEE 10th International Conference on Consumer Electronics (ICCE-Berlin). IEEE, 2020. http://dx.doi.org/10.1109/icce-berlin50680.2020.9352195.
Pełny tekst źródłaJoe, Byunggill, Insik Shin i Jihun Hamm. "Online Evasion Attacks on Recurrent Models:The Power of Hallucinating the Future". W Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/433.
Pełny tekst źródła