Table Redundancy Method for Protecting against Fault Attacks
نویسندگان
چکیده
منابع مشابه
Protecting Elliptic Curve Cryptography Against Fault Injection Attacks
Context. A fault injection attack consists in modifying an intermediate value of a computation (using an electromagnetic pulse or by acting on the power supply of the circuit) and exploiting the faulted final result to gather information about the computation that would not be accessible in a correct final result. For instance, did you know that due to the simplicity of the arithmetic behind RS...
متن کاملProtecting Users against Phishing Attacks
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, 57 million US Internet users have identified the receipt of email linked t...
متن کاملProtecting obfuscation against arithmetic attacks
Recently, the work of Garg et al. (FOCS 2013) gave the first candidate general-purpose obfuscator. This construction is built upon multilinear maps, also called a graded encoding scheme. Several subsequent works have shown that variants of this obfuscator achieves the highest notion of security (VBB security) against “purely algebraic” attacks, namely attacks that respect the restrictions of th...
متن کاملProtecting Obfuscation against Algebraic Attacks
The goal of general-purpose program obfuscation is to make an arbitrary computer program “unintelligible” while preserving its functionality. At least as far back as the work of Diffie and Hellman in 1976, researchers have contemplated applications of general-purpose obfuscation. However, until 2013, even heuristic constructions for general-purpose obfuscation were not known. This changed with ...
متن کاملCacheShield: Protecting Legacy Processes Against Cache Attacks
Cache attacks pose a threat to any code whose execution ow or memory accesses depend on sensitive information. Especially in public clouds, where caches are shared across several tenants, cache attacks remain an unsolved problem. Cache attacks rely on evictions by the spy process, which alter the execution behavior of the victim process. We show that hardware performance events of cryptographic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: 2169-3536
DOI: 10.1109/access.2021.3092314