Skip to search formSkip to main contentSkip to account menu

Oracle attack

Known as: Compression oracle, Compression oracle attack 
In the field of security engineering, an oracle attack is an attack that exploits the availability of a weakness in the system which can be used as… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Blockchain technology is not only growing everyday at a fast-passed rhythm, but it is also a disruptive technology that has… 
2017
2017
CAPTCHAs/HIPs are security mechanisms that try to prevent automatic abuse of services. They are susceptible to learning attacks… 
2015
2015
The paper proposes a digital signature-based approach for image authentication, pixel-wise tamper localization and iterative… 
2015
2015
We evaluate the performance of smart metadetection as a way to combat oracle attacks in watermarking. In a recent work, we have… 
2010
2010
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security… 
2009
2009
2008
2008
Singular value decomposition (SVD) is robust and reliable orthogonal matrix decomposition. Due to its conceptual and stability… 
2004
2004
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity… 
2004
2004
The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations…