Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,035,249 papers from all fields of science
Search
Sign In
Create Free Account
Attack surface
The attack surface of a software environment is the sum of the different points (the "attack vectors") where an unauthorized user (the "attacker…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
ARM architecture
Attack Surface Analyzer
Browser security
Cloud storage
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Exploring the Attack Surface of Blockchain: A Comprehensive Survey
Muhammad Saad
,
Jeffrey Spaulding
,
+4 authors
David A. Mohaisen
IEEE Communications Surveys and Tutorials
2020
Corpus ID: 216023224
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains…
Expand
Review
2019
Review
2019
Exploring the Attack Surface of Blockchain: A Systematic Overview
Muhammad Saad
,
Jeffrey Spaulding
,
+4 authors
Aziz Mohaisen
arXiv.org
2019
Corpus ID: 102350779
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains…
Expand
Highly Cited
2018
Highly Cited
2018
Blockchain mechanisms for IoT security
D. Minoli
,
B. Occhiogrosso
Internet of Things
2018
Corpus ID: 69340603
Highly Cited
2018
Highly Cited
2018
Security and privacy challenges in smart cities
Trevor Braun
,
B. Fung
,
Farkhund Iqbal
,
B. Shah
2018
Corpus ID: 49430339
Review
2016
Review
2016
Security, Privacy, and Access Control in Information-Centric Networking: A Survey
R. Tourani
,
S. Misra
,
Travis Mick
,
Gaurav Panwar
IEEE Communications Surveys and Tutorials
2016
Corpus ID: 3583771
Information-centric networking (ICN) replaces the widely used host-centric networking paradigm in communication networks (e.g…
Expand
Highly Cited
2016
Highly Cited
2016
Towards the Science of Security and Privacy in Machine Learning
Nicolas Papernot
,
P. Mcdaniel
,
Arunesh Sinha
,
Michael P. Wellman
arXiv.org
2016
Corpus ID: 6726938
Advances in machine learning (ML) in recent years have enabled a dizzying array of applications such as data analytics…
Expand
Highly Cited
2012
Highly Cited
2012
FPGAs for trusted cloud computing
Ken Eguro
,
R. Venkatesan
International Conference on Field-Programmable…
2012
Corpus ID: 14628245
FPGA manufacturers have offered devices with bitstream protection for a number of years. This feature is currently primarily used…
Expand
Highly Cited
2009
Highly Cited
2009
Energy Theft in the Advanced Metering Infrastructure
Stephen E. McLaughlin
,
Dmitry Podkuiko
,
P. Mcdaniel
Critical Information Infrastructures Security
2009
Corpus ID: 206746108
Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle…
Expand
Highly Cited
2005
Highly Cited
2005
The surface of vulnerability: An analytical framework for examining environmental change
Amy Luers
2005
Corpus ID: 14647057
Highly Cited
2005
Highly Cited
2005
Measuring Relative Attack Surfaces
Michael Howard
,
Jon Pincus
,
Jeannette M. Wing
2005
Corpus ID: 8149329
We propose a metric for determining whether one version of a system is more secure than another with respcct to a fixed set of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE