نتایج جستجو برای: countermeasures

تعداد نتایج: 9039  

2006
Alla Genkina

.tifpng.png‘convert 1 ‘dirname 1‘/‘basename 1 .tif‘.png Phishing is a new category of crime enabled by the lack of verifiable identity information or reliable trust indicators on the web. A phishing attack works when it convinces a person to place trust in a criminally untrustworthy party by masquerading as a trusted party. Better indicators about which parties are trustworthy can enable end us...

2009
Xu Guo Junfeng Fan Patrick Schaumont Ingrid Verbauwhede

Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. However, selecting and integrating a set of countermeasures targeting multiple attacks into an ECC design is far from trivial. Security, performance and cost need to be considered together. In this paper, we describe a g...

2016
Ágnes Kiss Juliane Krämer Pablo Rauzy Jean-Pierre Seifert

In this work, we analyze all existing RSA-CRT countermeasures against the Bellcore attack that use binary self-secure exponentiation algorithms. We test their security against a powerful adversary by simulating fault injections in a fault model that includes random, zeroing, and skipping faults at all possible fault locations. We find that most of the countermeasures are vulnerable and do not p...

2018
Michio Murakami Yoshitake Takebayashi Yoshihito Takeda Akiko Sato Yasumasa Igarashi Kazumi Sano Tetsuo Yasutaka Wataru Naito Sumire Hirota Aya Goto Tetsuya Ohira Seiji Yasumura Koichi Tanigawa

After the Fukushima Daiichi Nuclear Power Station accident in 2011, concerns about radiation exposure and decline in subjective well-being have been reported. To tackle these problems, various countermeasures in relation to radiation have been implemented. In this study, we comprehensively evaluated the effects of radiological countermeasures on subjective well-being (e.g., satisfaction with li...

Journal: :Journal of applied physiology 2005
C E Wade K I Stanford T P Stein J E Greenleaf

Spaceflight and prolonged bed rest (BR) alter plasma hormone levels inconsistently. This may be due, in part, to prescription of heavy exercise as a countermeasure for ameliorating the adverse effects of disuse. The initial project was to assess exercise programs to maintain aerobic performance and leg strength during BR. The present study evaluates the effect of BR and the performance of the p...

2009
Pankaj Rohatgi

EM is a side-channel with a long history of rumors and leaks associated with its use for espionage. It is well known that defense organizations across the world are paranoid about limiting EM emanations from their equipment and facilities and conduct research on EM attacks and defenses in total secrecy. In the United States, such work is classified under the codename “TEMPEST” which is believed...

2009
Onur Aciiçmez Çetin Kaya Koç

Microarchitectural analysis (MA) is a fast evolving area of side-channel cryptanalysis. This new area focuses on the effects of common processor components and their functionalities on the security of software cryptosystems. The main characteristic of microarchitectural attacks, which sets them aside from classical side-channel attacks, is the simple fact that they exploit the microarchitectura...

2011
Marc Joye Mohamed Karroumi

An efficient countermeasure against fault attacks for a rightto-left binary exponentiation algorithm was proposed by Boscher, Naciri and Prouff (WISTP, 2007). This countermeasure was later generalized by Baek (Int. J. Inf. Sec., 2010) to the 2w-ary right-to-left algorithms for any w > 1 (the case w = 1 corresponding to the method of Boscher, Naciri and Prouff). In this paper, we modify theses a...

2015

Recent history has amply demonstrated the threat that worms pose to the Internet and those who rely on its correct functioning. Most of the damage done by worms can be traced to the burden they place on networks due to their characteristic exponential growth as they seek to propagate themselves. As such, if security professionals can develop a framework for preventing worm propagation then they...

2010
Eric Vétillard Anthony Ferrari

Logical attacks on smart cards have been used for many years, but their attack potential is hindered by the processes used by issuers to verify the validity of code, in particular bytecode verification. More recently, the idea has emerged to combine logical attacks with a physical attack, in order to evade bytecode verification. We present practical work done recently on this topic, as well as ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید