A Trust-Based Malicious RSU Detection Mechanism in Edge-Enabled Vehicular Ad Hoc Networks. (arXiv:2208.05680v1 [cs.CR])
Edge-enabled Vehicular Ad Hoc Network (VANET) introduces real-time services and storage, computation, and communication facilities to the vehicles through Roadside Units (RSUs). Nevertheless, RSUs are often easy targets for security…
A Trust-Based Malicious RSU Detection Mechanism in Edge-Enabled Vehicular Ad Hoc Networks. (arXiv:2208.05680v1 [cs.CR])
Edge-enabled Vehicular Ad Hoc Network (VANET) introduces real-time services and storage, computation, and communication facilities to the vehicles through Roadside Units (RSUs). Nevertheless, RSUs are often easy targets for security…
Improving Tourist Experience Through an IoT Application Based on FatBeacons. (arXiv:2208.05707v1 [cs.CR])
This paper describes the use of a new extension of the Bluetooth connection protocol, called FatBeacon, which faces the problem of obtaining information where no Internet connection is available. Rather…
Improving Tourist Experience Through an IoT Application Based on FatBeacons. (arXiv:2208.05707v1 [cs.CR])
This paper describes the use of a new extension of the Bluetooth connection protocol, called FatBeacon, which faces the problem of obtaining information where no Internet connection is available. Rather…
Secure ambient intelligence prototype for airports. (arXiv:2208.05734v1 [cs.CR])
Nowadays, many technological advances applied to the Internet of Things (IoT) make the introduction of innovative sensors aimed to deploy efficient wireless sensor networks possible. In order to improve the…
General Cutting Planes for Bound-Propagation-Based Neural Network Verification. (arXiv:2208.05740v1 [cs.LG])
Bound propagation methods, when combined with branch and bound, are among the most effective methods to formally verify properties of deep neural networks such as correctness, robustness, and safety. However,…
CVE-2022-20365
Product: AndroidVersions: Android kernelAndroid ID: A-229632566References: N/A
Twisted by the Pools: Detection of Selfish Anomalies in Proof-of-Work Mining. (arXiv:2208.05748v1 [cs.CR])
The core of many cryptocurrencies is the decentralised validation network operating on proof-of-work technology. In these systems, validation is done by so-called miners who can digitally sign blocks once they…
A Survey of MulVAL Extensions and Their Attack Scenarios Coverage. (arXiv:2208.05750v1 [cs.CR])
Organizations employ various adversary models in order to assess the risk and potential impact of attacks on their networks. Attack graphs represent vulnerabilities and actions an attacker can take to…
CVE-2022-20366
In ioctl_dpm_clk_update of lwis_ioctl.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed.…