A CFI Countermeasure Against GOT Overwrite Attacks
نویسندگان
چکیده
منابع مشابه
Threshold Implementation as a Countermeasure against Power Analysis Attacks
One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...
متن کاملCountermeasure for collusion attacks against digital watermarking
Customer identification watermarking today is one of the most promising application domains of digital watermarking. It enables to identify individual copies of otherwise indistinguishable digital copies. If done without any precautions, those individual watermarking are vulnerable to a number of specialized attacks based on an attacker collecting more than one individual copy. Fingerprinting a...
متن کاملLeakage Squeezing Countermeasure against High-Order Attacks
In the recent years, side channel attacks have been widely investigated. In particular, second order attacks (2O-attacks) have been improved and successfully applied to break many masked implementations. In this context we propose a new concept to hinder attacks of all order: instead of injecting more entropy, we make the most of a single-mask entropy. With specially crafted bijections instanti...
متن کاملRandomized Addition-Subtraction Chains as a Countermeasure against Power Attacks
Power Analysis attacks on elliptic curve cryptosystems and various countermeasures against them, have been first discussed by Coron ([6]). All proposed countermeasures are based on the randomization or blinding of the inputparameters of the binary algorithm. We propose a countermeasure that randomizes the binary algorithm itself. Our algorithm needs approximately 9% more additions than the ordi...
متن کاملClient Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks
:H LQWURGXFH D FU\SWRJUDSKLFDOO\ EDVHG FRXQWHUPHD VXUH DJDLQVW FRQQHFWLRQ GHSOHWLRQ DWWDFNV &RQQHFWLRQ GHSOHWLRQ LV D GHQLDO RI VHUYLFH DWWDFN LQ ZKLFK DQ DW WDFNHU VHHNV WR LQLWLDWH DQG OHDYH XQUHVROYHG D ODUJH QXPEHU RI FRQQHFWLRQ UHTXHVWV WR D VHUYHU H[KDXVWLQJ LWV UHVRXUFHV DQG UHQGHULQJ LW LQFDSDEOH RI VHUYLFLQJ OH JLWLPDWH UHTXHVWV 7&3 6<1 qRRGLQJ LV D ZHOO NQRZQ H[DPSOH RI VXFK DQ DWWDFN...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2975037