نتایج جستجو برای: countermeasures
تعداد نتایج: 9039 فیلتر نتایج به سال:
.tifpng.png‘convert 1 ‘dirname 1‘/‘basename 1 .tif‘.png Phishing is a new category of crime enabled by the lack of verifiable identity information or reliable trust indicators on the web. A phishing attack works when it convinces a person to place trust in a criminally untrustworthy party by masquerading as a trusted party. Better indicators about which parties are trustworthy can enable end us...
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. However, selecting and integrating a set of countermeasures targeting multiple attacks into an ECC design is far from trivial. Security, performance and cost need to be considered together. In this paper, we describe a g...
In this work, we analyze all existing RSA-CRT countermeasures against the Bellcore attack that use binary self-secure exponentiation algorithms. We test their security against a powerful adversary by simulating fault injections in a fault model that includes random, zeroing, and skipping faults at all possible fault locations. We find that most of the countermeasures are vulnerable and do not p...
After the Fukushima Daiichi Nuclear Power Station accident in 2011, concerns about radiation exposure and decline in subjective well-being have been reported. To tackle these problems, various countermeasures in relation to radiation have been implemented. In this study, we comprehensively evaluated the effects of radiological countermeasures on subjective well-being (e.g., satisfaction with li...
Spaceflight and prolonged bed rest (BR) alter plasma hormone levels inconsistently. This may be due, in part, to prescription of heavy exercise as a countermeasure for ameliorating the adverse effects of disuse. The initial project was to assess exercise programs to maintain aerobic performance and leg strength during BR. The present study evaluates the effect of BR and the performance of the p...
EM is a side-channel with a long history of rumors and leaks associated with its use for espionage. It is well known that defense organizations across the world are paranoid about limiting EM emanations from their equipment and facilities and conduct research on EM attacks and defenses in total secrecy. In the United States, such work is classified under the codename “TEMPEST” which is believed...
Microarchitectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new area focuses on the effects of common processor components and their functionalities on the security of software cryptosystems. The main characteristic of microarchitectural attacks, which sets them aside from classical side-channel attacks, is the simple fact that they exploit the microarchitectura...
An efficient countermeasure against fault attacks for a rightto-left binary exponentiation algorithm was proposed by Boscher, Naciri and Prouff (WISTP, 2007). This countermeasure was later generalized by Baek (Int. J. Inf. Sec., 2010) to the 2w-ary right-to-left algorithms for any w > 1 (the case w = 1 corresponding to the method of Boscher, Naciri and Prouff). In this paper, we modify theses a...
Recent history has amply demonstrated the threat that worms pose to the Internet and those who rely on its correct functioning. Most of the damage done by worms can be traced to the burden they place on networks due to their characteristic exponential growth as they seek to propagate themselves. As such, if security professionals can develop a framework for preventing worm propagation then they...
Logical attacks on smart cards have been used for many years, but their attack potential is hindered by the processes used by issuers to verify the validity of code, in particular bytecode verification. More recently, the idea has emerged to combine logical attacks with a physical attack, in order to evade bytecode verification. We present practical work done recently on this topic, as well as ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید