Abstract: The article examines race conditions as methods of attack. Discusses developments in hardware and Unix based systems. Examples of how race conditions arise are presented Some basic techniques to avoid them are discribed.
Key words: race conditions, attacks, security.
Ventsislav Trifonov, Ivaylo Atanasov, Evelina Pencheva
Abstract: Security functions in Machine-to-Machine communications are studied and abstraction is identified using application programming interfaces. The interfaces can be used for mutual authentication between mobile entities and a central unit, as well as for protection of unique identities. The trust and security management interfaces are described by the use of class diagrams, state diagrams and sequence diagrams illustrating the interface application.
Key words: Machine-to-Machine communication, mobile monitoring, security
Ognian Nakov, Dobromir Hristov, Nadja Angelova
Abstract: The article discusses techniques for countering certain types of network attacks against software applications working in web environments and multi-user network applications.
Key words: security, code, attack