Advancing Software Security and Reliability in Cloud Platforms through AI-based Anomaly Detection
Continuous Integration/Continuous Deployment (CI/CD) is fundamental for advanced
software development, supporting faster and more efficient delivery of code changes into …
software development, supporting faster and more efficient delivery of code changes into …
[PDF][PDF] Automated Information Leakage Detection: A New Method Combining Machine Learning and Hypothesis Testing with an Application to Side-channel Detection …
Due to the proliferation of a large amount of publicly available data, information leakage (IL)
has become a major problem. IL occurs when secret (sensitive) information of a system is …
has become a major problem. IL occurs when secret (sensitive) information of a system is …
On the security of TLS in the real world
R Merget - 2023 - hss-opus.ub.ruhr-unibochum.de
RUB-Repository - On the security of TLS in the real world Deutsch OPUS UB Bochum RUB
» Bibliotheksportal Home Search Browse Publish FAQ OPUS UB Bochum On the security of …
» Bibliotheksportal Home Search Browse Publish FAQ OPUS UB Bochum On the security of …
[PDF][PDF] Pushing the AutoSCA Tool to Picosecond Precision: Improving Timing Side Channel Detection
DM Funke - 2022 - researchgate.net
The Auto-SCA tool is a powerful instrument for detecting TLS side-channels, developed by
Drees et al.[1]. Their novel approach of training binary classifiers on network traces to …
Drees et al.[1]. Their novel approach of training binary classifiers on network traces to …
[PDF][PDF] TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations
TLS-Attacker is an open-source framework for analyzing Transport Layer Security (TLS)
implementations. The framework allows users to specify custom protocol flows and provides …
implementations. The framework allows users to specify custom protocol flows and provides …
[PDF][PDF] How Machine Learning Enables Automated Side-Channel Detection
JP Drees - 2023 - researchgate.net
In a world where digital communication has become ubiquitous, protecting it against
malicious actors is as important as ever. This is where modern cryptography shines, using …
malicious actors is as important as ever. This is where modern cryptography shines, using …
Design Theory Methods and their Applications to the Science of Security
B Garn - 2023 - repositum.tuwien.at
This Thesis introduces the research program Design Theory Framework for the Science of
Security (DEFSYS) and presents its application to four areas of information security. The …
Security (DEFSYS) and presents its application to four areas of information security. The …