نتایج جستجو برای: software countermeasure
تعداد نتایج: 441146 فیلتر نتایج به سال:
The application of built-to-order embedded hardware designs in safety critical systems requires a high design quality and robustness during operation. Flawless execution of the involved software can be compromised by malfunctioning hardware components or by software-induced errors. Furthermore, intellectual property (IP) tends to become unavoidable in modern hardware designs. Any unexpected beh...
This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigat...
Side-channel attacks are powerful for retrieving secret data by exploiting physical measurements, such as power consumption or electromagnetic emissions. Masking is a popular countermeasure it can be proven secure against an attacker model. In practice, software-masked implementations suffer from security reduction due to mismatch between the considered leakage sources in proof and real ones, w...
The "Variable Vector Countermeasure Suit (V2Suit) for Space Habitation and Exploration" is a novel system concept that provides a platform for integrating sensors and actuators with daily astronaut intravehicular activities to improve health and performance, while reducing the mass and volume of the physiologic adaptation countermeasure systems, as well as the required exercise time during long...
We found countermeasures to protocols using P300 in concealed information tests. One, the "six-probe" protocol, in Experiment 1, uses six different crime details in one run. The countermeasure: generate covert responses to irrelevant stimuli for each probe category. Hit rates were 82% in the guilty group; 18% in the countermeasure group. The average reaction time (RT) distinguished these two gr...
Implementation security for lattice-based cryptography is still a vastly unexplored field. At CHES 2016, the very first side-channel attack on a lattice-based signature scheme was presented. Later, shuffling was proposed as an inexpensive means to protect the Gaussian sampling component against such attacks. However, the concrete effectiveness of this countermeasure has never been evaluated. We...
OBJECTIVES The current study aimed to examine the effectiveness of a resistive vibration exercise countermeasure during prolonged bed-rest in preventing lower-limb muscle atrophy. METHODS 20 male subjects underwent 56-days of bed-rest and were assigned to either an inactive control, or a countermeasure group which performed high-load resistive exercises (including squats, heel raises and toe ...
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation), Sprout was proposed. Sprout was insecure and an improved version of Sprout was presented in FSE 2017. We introduced Fruit stream cipher informally in 2016 on the web page...
Higher-order side channel attacks is a class of powerful techniques against cryptographic implementations. Their complexity grows exponentially with the order, but for small orders (e.g. 2 and 3) recent studies have demonstrated that they pose a serious threat in practice. In this context, it is today of great importance to design software countermeasures enabling to counteract higher-order sid...
In the recent years, side channel attacks have been widely investigated. In particular, second order attacks (2O-attacks) have been improved and successfully applied to break many masked implementations. In this context we propose a new concept to hinder attacks of all order: instead of injecting more entropy, we make the most of a single-mask entropy. With specially crafted bijections instanti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید