نتایج جستجو برای: software countermeasure

تعداد نتایج: 441146  

2015
Sikhar Patranabis Abhishek Chakraborty Phuong Ha Nguyen Debdeep Mukhopadhyay

In this paper we propose the first practical fault attack on the time redundancy countermeasure for AES using a biased fault model. We develop a scheme to show the effectiveness of a biased fault model in the analysis of the time redundancy countermeasure. Our attack requires only faulty ciphertexts and does not assume strong adversarial powers. We successfully demonstrate our attack on simulat...

2015
Artur Janicki

In this paper a novel speaker verification spoofing countermeasure based on analysis of linear prediction error is presented. The method analyses the energy of the prediction error, prediction gain and temporal parameters related to the prediction error signal. The idea of the proposed algorithm and its implementation is described in detail. Various binary classifiers were researched to separat...

2005
C. Gebotys

ABSTRACT Future wireless embedded devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although many embedded devices offer more resistance to bus probing attacks due to their compact size, susceptibility to power or electromagnetic analysis attacks must be analyzed. This paper presents a table masking countermeasure to resist diff...

Journal: :J. Electronic Testing 2016
Jaya Dofe Hoda Pahlevanzadeh Qiaoyan Yu

The secret key used in a cryptosystem can be retrieved by physical attacks such as side-channel analysis (SCA) and fault analysis (FA) attacks. Traditionally, countermeasures for different physical attacks are developed in a separate fashion. To lay a solid foundation for countermeasure development for the emerging combined attacks, it is imperative to thoroughly study how the countermeasure fo...

Journal: :IACR Cryptology ePrint Archive 2017
Jean-Sébastien Coron Franck Rondepierre Rina Zeitoun

Masking is an effective countermeasure against side-channel attacks. In this paper, we improve the efficiency of the high-order masking of look-up tables countermeasure introduced at Eurocrypt 2014, based on a combination of three techniques, and still with a proof of security in the Ishai-Sahai-Wagner (ISW) probing model. The first technique consists in proving security under the stronger t-SN...

Journal: :international journal of transportation engineereing 2016
eugene vida maina albert ford michael robinson

the highway safety manual [hsm, 2010] recommends safety evaluations be performed beforeimplementing any roadway treatment to predict the expected safety consequences. safety consequences canbe measured using crash prediction models, crash modification factor (cmfs), or both. this paperdevelops a cmf to show the expected impact of red-light cameras (rlcs) on safety at signalizedintersections. a ...

Journal: :Journal of strength and conditioning research 2017
Philip A Carvil Julia Attias Simon N Evetts James M Waldie David A Green

Carvil, PA, Attias, J, Evetts, SN, Waldie, JM, and Green, DA. The effect of the gravity loading countermeasure skinsuit upon movement and strength. J Strength Cond Res 31(1): 154-161, 2017-Effective countermeasures against musculoskeletal deconditioning induced by microgravity and disuse are required. A simple alternative to provision of artificial gravity by centrifugation is compressive axial...

Journal: :I. J. Network Security 2012
Mustapha Hedabou

Pairing based cryptosystems have became suitable for use on constrained devices with small resources. Recently, It has shown that side channel attacks are a serious threat for such cryptographic applications. In order to secure the pairing based cryptosystems against the side channel attacks, many countermeasures have been proposed but their cost is proved to be highly expensive. In this paper,...

2012
Kazuyuki Tanimura Nikil Dutt Nikil D. Dutt

DPA (Differential Power Analysis) attacks statistically find the correlation between power consumption and secret data in crypto-hardware. WDDL (Wave Dynamic Differential Logic) is a standard cell-based countermeasure for DPA and guarantees a 100% switching factor to shield the power information. However, our experiments observe that WDDL fails to compensate the power imbalance. This paper prop...

Journal: :E3S web of conferences 2023

In this study, to investigate the effect of multiple countermeasure on flow characteristics debris flows, a real-scale experiment was conducted in natural gully by reproducing with installation countermeasures. addition, topographic changes before and after were investigated using UAV-LiDAR. Based results, countermeasures against erosion deposition caused also analyzed. The significantly decrea...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید