The complete guide to scion

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

[BOEK][B] SCION: a secure Internet architecture

A Perrig, P Szalachowski, RM Reischuk, L Chuat - 2017 - Springer
The SCION project started in Summer 2009 at Carnegie Mellon University (CMU), when we
began meeting weekly with Haowen Chan, Hsu-Chun Hsiao, and **n Zhang to consider …

To filter or to authorize: Network-layer DoS defense against multimillion-node botnets

X Liu, X Yang, Y Lu - Proceedings of the ACM SIGCOMM 2008 …, 2008 - dl.acm.org
This paper presents the design and implementation of a filter-based DoS defense system
(StopIt) and a comparison study on the effectiveness of filters and capabilities. Central to the …

Portcullis: Protecting connection setup from denial-of-capability attacks

B Parno, D Wendlandt, E Shi, A Perrig… - ACM SIGCOMM …, 2007 - dl.acm.org
Systems using capabilities to provide preferential service to selected flows have been
proposed as a defense against large-scale network denial-of-service attacks. While these …

Verifying and enforcing network paths with ICING

J Naous, M Walfish, A Nicolosi, D Mazieres… - Proceedings of the …, 2011 - dl.acm.org
We describe a new networking primitive, called a Path Verification Mechanism (pvm). There
has been much recent work about how senders and receivers express policies about the …

A variational framework for active and adaptative segmentation of vector valued images

M Rousson, R Deriche - … on Motion and Video Computing, 2002 …, 2002 - ieeexplore.ieee.org
Much effort has been made in integrating different information in a variational framework to
segment images. Recent works on curve propagation were able to incorporate stochastic …

TVA: A DoS-limiting network architecture

X Yang, D Wetherall, T Anderson - IEEE/ACM Transactions on …, 2008 - ieeexplore.ieee.org
We motivate the capability approach to network denial-of-service (DoS) attacks, and
evaluate the traffic validation architecture (TVA) architecture which builds on capabilities …

SIBRA: Scalable internet bandwidth reservation architecture

C Basescu, RM Reischuk, P Szalachowski… - arxiv preprint arxiv …, 2015 - arxiv.org
This paper proposes a Scalable Internet Bandwidth Reservation Architecture (SIBRA) as a
new approach against DDoS attacks, which, until now, continue to be a menace on today's …

Palm vein recognition with local binary patterns and local derivative patterns

L Mirmohamadsadeghi… - 2011 International Joint …, 2011 - ieeexplore.ieee.org
Palm vein feature extraction from near infrared images is a challenging problem in hand
pattern recognition. In this paper, a promising new approach based on local texture patterns …

Practical proactive DDoS-attack mitigation via endpoint-driven in-network traffic control

Z Liu, H **, YC Hu, M Bailey - IEEE/ACM Transactions on …, 2018 - ieeexplore.ieee.org
Volumetric attacks, which overwhelm the bandwidth of a destination, are among the most
common distributed denial-of-service (DDoS) attacks today. Despite considerable effort …