On the feasibility of automated semantic attacks in the cloud

5Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

While existing security mechanisms often work well against most known attack types, they are typically incapable of addressing semantic attacks. Such attacks bypass technical protection systems by exploiting the emotional response of the users in unusual technical configurations rather than by focussing on specific technical vulnerabilities. We show that semantic attacks can easily be performed in a cloud environment, where applications that would traditionally be run locally may now require interaction with an online system shared by several users. We illustrate the feasibility of an automated semantic attack in a popular cloud storage environment, evaluate its impact and provide recommendations for defending against such attacks. © 2013 Springer-Verlag London.

Cite

CITATION STYLE

APA

Heartfield, R., & Loukas, G. (2013). On the feasibility of automated semantic attacks in the cloud. In Computer and Information Sciences III - 27th International Symposium on Computer and Information Sciences, ISCIS 2012 (pp. 343–351). Kluwer Academic Publishers. https://doi.org/10.1007/978-1-4471-4594-3_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free