نتایج جستجو برای: countermeasures

تعداد نتایج: 9039  

2013
Waldo Rocha Flores Mathias Ekstedt

Social engineering exploits vulnerabilities at different layers (i.e. technical, social layer) in an organizational defense structure. It is therefore important to understand how to defend against these attacks using a holistic defense approach including multiple countermeasures. The literature suggests a plethora of countermeasures, little research has however been done to assess their effecti...

2006
Tal Malkin François-Xavier Standaert Moti Yung

Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption algorithms. To protect cryptographic implementations (e.g. of the recent AES which will be our running example) against these attacks, a number of innovative countermeasures have been proposed, usually based on the use of space and time redundancies (e.g....

Journal: :Journal of radiological protection : official journal of the Society for Radiological Protection 2005
Bent Lauritzen Per Hedemann-Jensen

In the event of a nuclear or radiological emergency resulting in an atmospheric release of radioactive materials, stationary gamma-measurements, for example obtained from distributed, automatic monitoring stations, may provide a first assessment of exposures resulting from airborne and deposited activity. Decisions on the introduction of countermeasures for the protection of the public can be b...

2011
Tim Güneysu Amir Moradi

In this work, we propose and evaluate generic hardware countermeasures against DPA attacks for recent FPGA devices. The proposed set of FPGA-specific countermeasures can be combined to resist a large variety of first-order DPA attacks, even with 100 million recorded power traces. This set includes generic and resource-efficient countermeasures for on-chip noise generation, random-data processin...

2003
Nevine Ebeid Anwar Hasan

One of the major threats to the security of cryptosystems nowadays is the information leaked through side channels. For instance, power analysis attacks have been successfully mounted on cryptosystems embedded into small devices such as smart cards. In the recent past, several DPA countermeasures have been proposed. Among these, two countermeasures, one proposed by Oswald and Aigner in [27] and...

2015
Sylvain Guilley Gilles Barthe François Dupressoir Pierre-Alain Fouque Benjamin Grégoire

Context. A fault injection attack consists in modifying an intermediate value of a computation (using an electromagnetic pulse or by acting on the power supply of the circuit) and exploiting the faulted final result to gather information about the computation that would not be accessible in a correct final result. For instance, did you know that due to the simplicity of the arithmetic behind RS...

2003
Dominique Lord

The Government of Burkina Faso has recently been conducting important macroeconomic changes, aiming at encouraging the economic growth of the country. In order to maintain this growth, the Government has put in place a transportation program to improve the efficiency and safety of the road network. This paper documents the study carried out in 2000 on the safety improvement of rural roads in Bu...

2014
Katsutoshi OHDO Yasumichi HINO Hiroki TAKAHASHI

The high frequency of fall accidents is a serious problem in Japan. Thus, more stringent countermeasures for preventing falls from scaffolds were developed and incorporated into institutional guidelines. These countermeasures aim to decrease deaths caused by falls from scaffolds. Despite the improvements in such measures, however, the rate of accidental fall deaths remains high in Japan's const...

2004
John D'Arcy Anat Hovav

General deterrence theory suggests that deterrent security countermeasures (e.g., security policies, security awareness programs, security software) can be used to control IS misuse in organizations. However, empirical studies that have examined the effectiveness of such techniques have produced inconclusive results. A limitation of these studies is that they ignore the impacts of sanction perc...

Journal: :Doboku Gakkai Ronbunshu 1986

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید