نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

1999
Ross Anderson Markus Kuhn

An increasing number of systems, from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security processors. We describe a number of attacks on such systems | some old, some new and some that are simply little known outside the chip testing community. We conclude that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device t...

Journal: :IACR Cryptology ePrint Archive 2013
Ivan Damg̊ard Sebastian Faust Pratyay Mukherjee Daniele Venturi

We initiate a general study of schemes resilient to both tampering and leakage attacks. Tampering attacks are powerful cryptanalytic attacks where an adversary can change the secret state and observes the effect of such changes at the output. Our contributions are outlined below: 1. We propose a general construction showing that any cryptographic primitive where the secret key can be chosen as ...

2013
Aruni Singh Sanjay Kumar Singh Shrikant Tiwari

Face plays an ethical role in human interaction compared to other biometrics. It is most popular non-intrusive and non-invasive biometrics whose image can easily be snapped without user co-operation. That is why; criminals and imposters always try to tamper their facial identity. Therefore, face tampering detection is one of the most important bottlenecks for security, commercial and industrial...

2012
G. R. Talmale R. W. Jasutkar

Multimedia Forensics has become important in the last few years. There are two maininterests, namely source identification and forgery detection. Source identification focuses onidentifying the source digital devices (cameras, mobile phones, camcorders, etc) using themedia produced by them, while forgery detection attempts to discover evidence of tampering byassessing the authen...

Journal: :IACR Cryptology ePrint Archive 2013
Aggelos Kiayias Yiannis Tselekounis

We initiate the investigation of gate-tampering attacks against cryptographic circuits. Our model is motivated by the plausibility of tampering directly with circuit gates and by the increasing use of tamper resilient gates among the known constructions that are shown to be resilient against wiretampering adversaries. We prove that gate-tampering is strictly stronger than wire-tampering. On the...

2012
Sami Alsouri Jan Sinschek Andreas Sewe Eric Bodden Mira Mezini Stefan Katzenbeisser

A hybrid cloud combines a trusted private cloud with a public cloud owned by an untrusted cloud provider. This is problematic: When a hybrid cloud shifts computation from its private to its public part, it must trust the public part to execute the computation as intended. We show how public-cloud providers can use dynamic anomaly detection to increase their clients’ trust in outsourced computat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید