An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances by repeatedly applying attack transformations. Such algorithms are widely used for testing intrusion detection systems. We investigate the notion of completeness of a mutation algorithm: its capability to generate all possible attack instances from a given set of attack transformations. We define the notion of a Φ-complete mutation algorithm. Given a set of transformations Φ, an algorithm is complete with respect to Φ, if it can generate every instance that the transformations in Φ derive. We show that if the rules in Φ are uniform and reversible then a Φ-complete algorithm exists. Intuitively speaking, uniform and reversible tran...
IP mutation is an effective moving target defense method against sniffer or hijacking attack. The mu...
Modern worms can spread so quickly that any countermea-sure based on human reaction might not be fas...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...
All in-text references underlined in blue are linked to publications on ResearchGate, letting you ac...
In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic...
Part 9: Information SecurityInternational audienceAll currently available Network-based Intrusion De...
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of ...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
Graduation date: 2017Mutation analysis is the gold standard for evaluating\ud test-suite adequacy. I...
A very effective means to evade signature-based intrusion detection systems (IDS) is to employ polym...
Every day, Intrusion Detection Systems around the world generate huge amounts of data. This data can...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
We present a new verification algorithm for security protocols that allows for unbounded verificatio...
IP mutation is an effective moving target defense method against sniffer or hijacking attack. The mu...
Modern worms can spread so quickly that any countermea-sure based on human reaction might not be fas...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...
All in-text references underlined in blue are linked to publications on ResearchGate, letting you ac...
In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic...
Part 9: Information SecurityInternational audienceAll currently available Network-based Intrusion De...
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of ...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
We study an automatic technique for the verification of cryptographic protocols based on a Horn clau...
Graduation date: 2017Mutation analysis is the gold standard for evaluating\ud test-suite adequacy. I...
A very effective means to evade signature-based intrusion detection systems (IDS) is to employ polym...
Every day, Intrusion Detection Systems around the world generate huge amounts of data. This data can...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
We present a new verification algorithm for security protocols that allows for unbounded verificatio...
IP mutation is an effective moving target defense method against sniffer or hijacking attack. The mu...
Modern worms can spread so quickly that any countermea-sure based on human reaction might not be fas...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...