نتایج جستجو برای: countermeasures
تعداد نتایج: 9039 فیلتر نتایج به سال:
Social engineering exploits vulnerabilities at different layers (i.e. technical, social layer) in an organizational defense structure. It is therefore important to understand how to defend against these attacks using a holistic defense approach including multiple countermeasures. The literature suggests a plethora of countermeasures, little research has however been done to assess their effecti...
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption algorithms. To protect cryptographic implementations (e.g. of the recent AES which will be our running example) against these attacks, a number of innovative countermeasures have been proposed, usually based on the use of space and time redundancies (e.g....
In the event of a nuclear or radiological emergency resulting in an atmospheric release of radioactive materials, stationary gamma-measurements, for example obtained from distributed, automatic monitoring stations, may provide a first assessment of exposures resulting from airborne and deposited activity. Decisions on the introduction of countermeasures for the protection of the public can be b...
In this work, we propose and evaluate generic hardware countermeasures against DPA attacks for recent FPGA devices. The proposed set of FPGA-specific countermeasures can be combined to resist a large variety of first-order DPA attacks, even with 100 million recorded power traces. This set includes generic and resource-efficient countermeasures for on-chip noise generation, random-data processin...
One of the major threats to the security of cryptosystems nowadays is the information leaked through side channels. For instance, power analysis attacks have been successfully mounted on cryptosystems embedded into small devices such as smart cards. In the recent past, several DPA countermeasures have been proposed. Among these, two countermeasures, one proposed by Oswald and Aigner in [27] and...
Context. A fault injection attack consists in modifying an intermediate value of a computation (using an electromagnetic pulse or by acting on the power supply of the circuit) and exploiting the faulted final result to gather information about the computation that would not be accessible in a correct final result. For instance, did you know that due to the simplicity of the arithmetic behind RS...
The Government of Burkina Faso has recently been conducting important macroeconomic changes, aiming at encouraging the economic growth of the country. In order to maintain this growth, the Government has put in place a transportation program to improve the efficiency and safety of the road network. This paper documents the study carried out in 2000 on the safety improvement of rural roads in Bu...
The high frequency of fall accidents is a serious problem in Japan. Thus, more stringent countermeasures for preventing falls from scaffolds were developed and incorporated into institutional guidelines. These countermeasures aim to decrease deaths caused by falls from scaffolds. Despite the improvements in such measures, however, the rate of accidental fall deaths remains high in Japan's const...
General deterrence theory suggests that deterrent security countermeasures (e.g., security policies, security awareness programs, security software) can be used to control IS misuse in organizations. However, empirical studies that have examined the effectiveness of such techniques have produced inconclusive results. A limitation of these studies is that they ignore the impacts of sanction perc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید