Countermeasure against Social Technologic Attack using Privacy Input-Detection
نویسندگان
چکیده
منابع مشابه
Data Privacy against Composition Attack
Data anonymization has become a major technique in privacy preserving data publishing. Many methods have been proposed to anonymize one dataset and a series of datasets of a data holder. However, no method has been proposed for the anonymization scenario of multiple independent data publishing. A data holder publishes a dataset, which contains overlapping population with other datasets publishe...
متن کاملFormal Study of a Countermeasure Against Side-Channel Attack
Context. In applications such as cryptography or real-time systems, formal methods are used to prove functional properties on the critical parts of the code. Specifically in cryptography, some nonfunctional properties are also important, but are not typically certified by formal proofs yet. One example of such a property is the resistance to side-channel attacks. Side-channel attacks are a real...
متن کاملCountermeasure Against Physical Layer Attack in Cognitive Radio Networks
A “Cognitive radio” is a latest technology aiming to solve the spectrum scarcity problem by allocating the spectrum to secondary users. It aims to improve the utilization of the radio spectrum by reducing the spectrum holes. The existing systems that have been proposed so far provided the solution for some attacks in the Physical layer of Cognitive radio with a limited number of nodes, evaluate...
متن کاملCountermeasure against tailored bright illumination attack for DPS-QKD.
We propose a countermeasure against the so-called tailored bright illumination attack for differential-phase-shift QKD (DPS-QKD). By monitoring a rate of coincidence detection at a pair of superconducting nanowire single-photon detectors (SSPDs) which is connected at each of the output ports of Bob's Mach-Zehnder interferometer, Alice and Bob can detect and defeat this kind of attack. We also e...
متن کاملCountermeasure against Side-Channel Attack in Shared Memory of TrustZone
In this paper we introduced countermeasures against side-channel attacks in the shared memory of TrustZone. We proposed zero-contention cache memory or policy between REE and TEE to prevent from TruSpy attacks in TrustZone. And we suggested that delay time of data path of REE is equal or similar to that of data path of TEE to prevent timing side-channel attacks. Also, we proposed security infor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Korea Contents Association
سال: 2012
ISSN: 1598-4877
DOI: 10.5392/jkca.2012.12.05.032