نتایج جستجو برای: countermeasure
تعداد نتایج: 4411 فیلتر نتایج به سال:
An important part of ITS (Intelligent Transportation Systems, formerly IVHS) is the development of collision avoidance systems. These systems continuously sense the dynamic state of the vehicle and the roadway situation, and they assess the potential for a collision. When the system determines that an emergency situation might be developing, it wams the driver to take evasive action. Such count...
In order to combat code injection attacks, modern operating systems use among others, the Write-XOR-Execute (W⊕X) countermeasure which disallows code execution from writable memory pages. Unfortunately though, a widely used programming technique, namely Just-in-time compilation (JIT), clashes with the use of this countermeasure since its use relies on writable memory where it places dynamically...
In this paper we propose the first practical fault attack on the time redundancy countermeasure for AES using a biased fault model. We develop a scheme to show the effectiveness of a biased fault model in the analysis of the time redundancy countermeasure. Our attack requires only faulty ciphertexts and does not assume strong adversarial powers. We successfully demonstrate our attack on simulat...
In this paper a novel speaker verification spoofing countermeasure based on analysis of linear prediction error is presented. The method analyses the energy of the prediction error, prediction gain and temporal parameters related to the prediction error signal. The idea of the proposed algorithm and its implementation is described in detail. Various binary classifiers were researched to separat...
ABSTRACT Future wireless embedded devices will be increasingly powerful supporting many more applications including one of the most crucial, security. Although many embedded devices offer more resistance to bus probing attacks due to their compact size, susceptibility to power or electromagnetic analysis attacks must be analyzed. This paper presents a table masking countermeasure to resist diff...
The secret key used in a cryptosystem can be retrieved by physical attacks such as side-channel analysis (SCA) and fault analysis (FA) attacks. Traditionally, countermeasures for different physical attacks are developed in a separate fashion. To lay a solid foundation for countermeasure development for the emerging combined attacks, it is imperative to thoroughly study how the countermeasure fo...
While in the early 2000’s lots of research was focused on Differential Power Analysis of first and second-order, it seems the recent trend is of even higher-order. As this order grows, countermeasures such as masking need to be designed in a more generic way. In this paper, we introduce a new constant weight implementation of the AES extending the idea of the software dual-rail countermeasure p...
Masking is an effective countermeasure against side-channel attacks. In this paper, we improve the efficiency of the high-order masking of look-up tables countermeasure introduced at Eurocrypt 2014, based on a combination of three techniques, and still with a proof of security in the Ishai-Sahai-Wagner (ISW) probing model. The first technique consists in proving security under the stronger t-SN...
the highway safety manual [hsm, 2010] recommends safety evaluations be performed beforeimplementing any roadway treatment to predict the expected safety consequences. safety consequences canbe measured using crash prediction models, crash modification factor (cmfs), or both. this paperdevelops a cmf to show the expected impact of red-light cameras (rlcs) on safety at signalizedintersections. a ...
Carvil, PA, Attias, J, Evetts, SN, Waldie, JM, and Green, DA. The effect of the gravity loading countermeasure skinsuit upon movement and strength. J Strength Cond Res 31(1): 154-161, 2017-Effective countermeasures against musculoskeletal deconditioning induced by microgravity and disuse are required. A simple alternative to provision of artificial gravity by centrifugation is compressive axial...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید