When a piece of software is loaded on an untrusted machine it can be analyzed by an attacker who could discover any secret information hidden in the code. Software protection by continuously updating the components deployed in an untrusted environment forces a malicious user to restart her or his analyses, thus reducing the time window in which the attack is feasible. In this setting, both the attacker and the defender need to know how to direct their(necessarily limited) efforts. In this paper, we analyze the problem from a game theoretical perspective in order to devise a rational strategy to decide when and which orthogonal updates have to be scheduled in order to minimize the security risks of tampering. We formalize the problem of prot...
We consider security issues in remote state estimation of cyber-physical systems in this chapter. We...
Abstract—We consider surveillance problems to be a set of system-adversary interaction problems in w...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
Abstract. Attackers of computing resources increasingly aim to keep security compromises hidden from...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
While there are significant advances in information technology and infrastructure which offer new op...
The security systems built to secure the computer network systems have to addressdynamically changin...
Patching vulnerabilities is one of the key activities in security management. For most commercial sy...
Abstract. Increasing concern about insider threats, cyber-espionage, and other types of attacks whic...
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A sensor nod...
We consider security issues in Cyber-Physical Systems (CPSs). A sensor node communicates with a remo...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
Today, information security in defender-attacker game models is getting more attention from the rese...
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A sensor nod...
We consider security issues in remote state estimation of cyber-physical systems in this chapter. We...
Abstract—We consider surveillance problems to be a set of system-adversary interaction problems in w...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
Abstract. Attackers of computing resources increasingly aim to keep security compromises hidden from...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
While there are significant advances in information technology and infrastructure which offer new op...
The security systems built to secure the computer network systems have to addressdynamically changin...
Patching vulnerabilities is one of the key activities in security management. For most commercial sy...
Abstract. Increasing concern about insider threats, cyber-espionage, and other types of attacks whic...
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A sensor nod...
We consider security issues in Cyber-Physical Systems (CPSs). A sensor node communicates with a remo...
Attackers can tamper with programs to break usage conditions. Different software protection techniqu...
Today, information security in defender-attacker game models is getting more attention from the rese...
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A sensor nod...
We consider security issues in remote state estimation of cyber-physical systems in this chapter. We...
Abstract—We consider surveillance problems to be a set of system-adversary interaction problems in w...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...