نتایج جستجو برای: countermeasure
تعداد نتایج: 4411 فیلتر نتایج به سال:
A new digital countermeasure against attacks related to the clock frequency is presented. This countermeasure, known as frequency sensor, consists of a local oscillator, a transition detector, a measurement element and an output block. The countermeasure has been designed using a full-custom technique implemented in an Application-Specific Integrated Circuit (ASIC), and the implementation has b...
Successful timing attacks against public-key cryptosystems have been demonstrated in many forms, suggesting the use of a technique known as blinding as countermeasure to these attacks. An alternative countermeasure has been considered, though somewhat overlooked and less studied in existing literature, consisting of idle-wait to make the decryption time independent of the data. In this work, we...
The authors have been developing the automatic scheduling systems for software development project, which deliver scheduling and worker assignment. Their earlier works were designed to draw on crashing and fast tracking to produce countermeasure plans against process delay. However, process delay can be recovered not only by crashing or fast tracking but also by using holiday works. Their earli...
In this paper we propose a multiplicative blinding scheme for protecting implementations of a scalar multiplication over elliptic curves. Specifically, this blinding method applies to elliptic curves in the short Weierstraß form over large prime fields. The described countermeasure is shown to be a generalization of the use of random curve isomorphisms to prevent side-channel analysis, and our ...
In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application’s co...
Side channels and covert channels can give untrusted applications access to the trusted and sensitive data in order to retrieve private information.. In this poster, we present a countermeasure called the Smartflush against cache-based Side Channel Attacks (SCAs). The Smartflush is a quick-patch countermeasure proposed to counter timing attacks that exploit inclusive caches in Intel’s x86 archi...
The use of random permutation tables as a side-channel attack countermeasure was recently proposed by Coron [6]. The countermeasure operates by ensuring that during the execution of an algorithm, each intermediate variable that is handled is in a permuted form described by the random permutation tables. In this paper, we examine the application of this countermeasure to the AES algorithm as des...
The NHTSA Office of Crash Avoidance Research (OCAR), in conjunction with the Research and Special Programs Administration (RSPA) Volpe National Transportation Systems Center (VNTSC), has underway a multi-disciplinary program to: identify crash causal factors and applicable countermeasure concepts, model target crash scenarios and Intelligent Vehicle Highway System (IVHS) technological intervent...
OBJECTIVE To bridge gaps identified during the 2009 H1N1 influenza pandemic by developing a system that provides public health departments improved capability to manage and track medical countermeasures at the state and local levels and to report their inventory levels to the Centers for Disease Control and Prevention (CDC). MATERIALS AND METHODS The CDC Countermeasure Tracking Systems (CTS) ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید