scholarly journals A Deeper Look into RowHammer’s Sensitivities:Experimental Analysis of Real DRAM Chipsand Implications on Future Attacks and Defenses

2021 ◽  
Author(s):  
Lois Orosa ◽  
Abdullah Giray Yaglikci ◽  
Haocong Luo ◽  
Ataberk Olgun ◽  
Jisung Park ◽  
...  
Keyword(s):  
Author(s):  
Yao Deng ◽  
Tiehua Zhang ◽  
Guannan Lou ◽  
Xi Zheng ◽  
Jiong Jin ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3922
Author(s):  
Sheeba Lal ◽  
Saeed Ur Rehman ◽  
Jamal Hussain Shah ◽  
Talha Meraj ◽  
Hafiz Tayyab Rauf ◽  
...  

Due to the rapid growth in artificial intelligence (AI) and deep learning (DL) approaches, the security and robustness of the deployed algorithms need to be guaranteed. The security susceptibility of the DL algorithms to adversarial examples has been widely acknowledged. The artificially created examples will lead to different instances negatively identified by the DL models that are humanly considered benign. Practical application in actual physical scenarios with adversarial threats shows their features. Thus, adversarial attacks and defense, including machine learning and its reliability, have drawn growing interest and, in recent years, has been a hot topic of research. We introduce a framework that provides a defensive model against the adversarial speckle-noise attack, the adversarial training, and a feature fusion strategy, which preserves the classification with correct labelling. We evaluate and analyze the adversarial attacks and defenses on the retinal fundus images for the Diabetic Retinopathy recognition problem, which is considered a state-of-the-art endeavor. Results obtained on the retinal fundus images, which are prone to adversarial attacks, are 99% accurate and prove that the proposed defensive model is robust.


2021 ◽  
pp. 1-1
Author(s):  
Jiaji He ◽  
Xiaolong Guo ◽  
Mark Tehranipoor ◽  
Apostol Vassilev ◽  
Yier Jin

Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


Sign in / Sign up

Export Citation Format

Share Document