Colored Petri Net Based Cache Side Channel Vulnerability Evaluation
نویسندگان
چکیده
منابع مشابه
PBB Efficiency Evaluation via Colored Petri Net Models
Basic components of Provider Backbone Bridge (PBB) network models were constructed: PBB interior switch, PBB edge switch—with the dynamic filling up of address tables. The modeling of PBB networks was implemented. The results of simulation reveal definite imperfections of PBB technology caused by the broadcasting and sensitivity to the ageing time of the address tables’ records, which complicat...
متن کاملSide-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems
Besides security against classical cryptanalysis, its important for cryptographic implementations to have sufficient robustness against side-channel attacks. Many countermeasures have been proposed to thwart side channel attacks, especially power trace measurement based side channel attacks. Additionally, researchers have proposed several evaluation metrics to evaluate side channel security of ...
متن کاملHTSN: A complex workflow model based on colored Petri net
* Corresponding author ABSTRACT Traditional workflow models have obvious shortcomings in describing complex workflows. Such complexity is due not only to the hierarchical property of business process, but also to the complicated dependencies among tasks. In this paper, we first introduce a conceptual task model based on UML class graph. Then we apply colored Petri nets to model task interfaces ...
متن کاملA Colored Petri Net Based Approach for Multi-agent Interactions
In a multi-agent system (MAS), agent interactions are established through exchanging messages following interaction protocols. Most current agent interaction protocols are hard-coded within agents during the agent designing, and this feature greatly reduces the flexibility of the agent interactions. In this paper, we present a Colored Petri Nets (CPNs) based approach to form flexible interactio...
متن کاملA Network Attack Model based on Colored Petri Net
The researches have shown that not all the Petri Net machines can be used to describe attack behavior. When Petri Net machines adapted for attack behavior modeling are detecting the network, for some event of current status, if there is matching event in the model, it has only one corresponding transition; otherwise that may cause errors. Since sharing synthesis and synchronization synthesis of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2955282