نتایج جستجو برای: software countermeasure
تعداد نتایج: 441146 فیلتر نتایج به سال:
In this paper we propose the first practical fault attack on the time redundancy countermeasure for AES using a biased fault model. We develop a scheme to show the effectiveness of a biased fault model in the analysis of the time redundancy countermeasure. Our attack requires only faulty ciphertexts and does not assume strong adversarial powers. We successfully demonstrate our attack on simulat...
In this paper a novel speaker verification spoofing countermeasure based on analysis of linear prediction error is presented. The method analyses the energy of the prediction error, prediction gain and temporal parameters related to the prediction error signal. The idea of the proposed algorithm and its implementation is described in detail. Various binary classifiers were researched to separat...
ABSTRACT Future wireless embedded devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although many embedded devices offer more resistance to bus probing attacks due to their compact size, susceptibility to power or electromagnetic analysis attacks must be analyzed. This paper presents a table masking countermeasure to resist diff...
The secret key used in a cryptosystem can be retrieved by physical attacks such as side-channel analysis (SCA) and fault analysis (FA) attacks. Traditionally, countermeasures for different physical attacks are developed in a separate fashion. To lay a solid foundation for countermeasure development for the emerging combined attacks, it is imperative to thoroughly study how the countermeasure fo...
Masking is an effective countermeasure against side-channel attacks. In this paper, we improve the efficiency of the high-order masking of look-up tables countermeasure introduced at Eurocrypt 2014, based on a combination of three techniques, and still with a proof of security in the Ishai-Sahai-Wagner (ISW) probing model. The first technique consists in proving security under the stronger t-SN...
the highway safety manual [hsm, 2010] recommends safety evaluations be performed beforeimplementing any roadway treatment to predict the expected safety consequences. safety consequences canbe measured using crash prediction models, crash modification factor (cmfs), or both. this paperdevelops a cmf to show the expected impact of red-light cameras (rlcs) on safety at signalizedintersections. a ...
Carvil, PA, Attias, J, Evetts, SN, Waldie, JM, and Green, DA. The effect of the gravity loading countermeasure skinsuit upon movement and strength. J Strength Cond Res 31(1): 154-161, 2017-Effective countermeasures against musculoskeletal deconditioning induced by microgravity and disuse are required. A simple alternative to provision of artificial gravity by centrifugation is compressive axial...
Pairing based cryptosystems have became suitable for use on constrained devices with small resources. Recently, It has shown that side channel attacks are a serious threat for such cryptographic applications. In order to secure the pairing based cryptosystems against the side channel attacks, many countermeasures have been proposed but their cost is proved to be highly expensive. In this paper,...
DPA (Differential Power Analysis) attacks statistically find the correlation between power consumption and secret data in crypto-hardware. WDDL (Wave Dynamic Differential Logic) is a standard cell-based countermeasure for DPA and guarantees a 100% switching factor to shield the power information. However, our experiments observe that WDDL fails to compensate the power imbalance. This paper prop...
In this study, to investigate the effect of multiple countermeasure on flow characteristics debris flows, a real-scale experiment was conducted in natural gully by reproducing with installation countermeasures. addition, topographic changes before and after were investigated using UAV-LiDAR. Based results, countermeasures against erosion deposition caused also analyzed. The significantly decrea...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید