نتایج جستجو برای: tamper

تعداد نتایج: 2422  

1999
Ross Anderson Markus Kuhn

An increasing number of systems, from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security processors. We describe a number of attacks on such systems | some old, some new and some that are simply little known outside the chip testing community. We conclude that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device t...

2016
Bhargavi Nisarga Eric Peeters

Security in embedded systems is a topic that is gaining prominence as embedded systems and products are being deployed everywhere to be used in our everyday routines. Security concerns for embedded system developers and its users scales from adversaries having remote to physical access of the system. Increasing security for remote access includes incorporating secure data communication and secu...

2010
Girija Chetty

In this paper, we propose novel algorithmic models based on feature transformation in cross-modal subspace and their multimodal fusion for different types of residue features extracted from several intra-frame and inter-frame pixel sub-blocks in video sequences for detecting digital video tampering or forgery. An evaluation of proposed residue features – the noise residue features and the quant...

Journal: :IACR Cryptology ePrint Archive 2013
Ivan Damg̊ard Sebastian Faust Pratyay Mukherjee Daniele Venturi

We initiate a general study of schemes resilient to both tampering and leakage attacks. Tampering attacks are powerful cryptanalytic attacks where an adversary can change the secret state and observes the effect of such changes at the output. Our contributions are outlined below: 1. We propose a general construction showing that any cryptographic primitive where the secret key can be chosen as ...

Journal: :IACR Cryptology ePrint Archive 2013
Aggelos Kiayias Yiannis Tselekounis

We initiate the investigation of gate-tampering attacks against cryptographic circuits. Our model is motivated by the plausibility of tampering directly with circuit gates and by the increasing use of tamper resilient gates among the known constructions that are shown to be resilient against wiretampering adversaries. We prove that gate-tampering is strictly stronger than wire-tampering. On the...

2012

• Low-cost, Class 1 single-phase energy meter solution • Low and cost effective capacitive power supply • External low frequency crystal for RTC • Battery backup for internal RTC • LCD interface through GPIO • Multiple tamper detection • Multiple measurement parameters • One-time, quick, and accurate digital calibration gives added benefits • Internal EEPROM to store calibration parameters, tam...

Journal: :IEICE Electronics Express 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید