Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges
نویسندگان
چکیده
منابع مشابه
Towards Security Limits in Side-Channel Attacks
In this paper, we consider a recently introduced framework that investigates physically observable implementations from a theoretical point of view. The model allows quantifying the effect of practically relevant leakage functions with a combination of security and information theoretic metrics. More specifically, we apply our evaluation methodology to an exemplary block cipher. We first consid...
متن کاملChallenges for Mobile Social Networking Applications
This paper presents work in progress regarding utilization of social network information for mobile applications. Primarily a number of challenges are identified, such as how to mine data from multiple social networks, how to integrate and consolidate social networks, and how to manage semantic information for mobile applications. The challenges are discussed from a semantic Web perspective usi...
متن کاملSide channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کاملEfficient Practical Key Recovery for Side-Channel Attacks
Side-channel attacks impose serious threats to the security of a cryptographic device. These attacks exploit the physical properties of a device in order to recover the secret key involved in the computations. Most side-channel attacks yield ranking lists of candidates for different parts of the secret key. The lists of candidates are typically ranked in the decreasing order of their likelihood...
متن کاملPractical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks
This paper analyzes the robustness of RSA countermeasures against electromagnetic analysis and collision attacks. The proposed RSA cryptosystem uses residue number systems (RNS) for fast executions of the modular calculi with large numbers. The parallel architecture is protected at arithmetic and algorithmic levels by using the Montgomery Ladder and the Leak Resistant Arithmetic countermeasures...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2017
ISSN: 2169-3536
DOI: 10.1109/access.2017.2665640