Side-Channel Analysis for Detecting Protocol Tunneling
نویسندگان
چکیده
منابع مشابه
Side-Channel Analysis for Detecting Protocol Tunneling
Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. We first discuss the timing side channels that have been found in protocol tunneling tools. We then show how to infer Hidden Markov models (HMMs) of network protocols from timing data and use the HMMs ...
متن کاملIs Side-Channel Analysis really reliable for detecting Hardware Trojans?
Hardware Trojans are malicious alterations to a circuit, inserted either during the design phase or during fabrication process. Due to the diversity of Trojans, detecting and/or locating them is a challenging task. Numerous approaches have been proposed to address this problem, whether logic testing based or side-channel analysis based techniques. In this paper, we focus on side-channel analysi...
متن کاملSide Channel Leakage Analysis
Nearly twenty years ago the discovery of side channel attacks has warned the world that security is more than just a mathematical problem. Serious considerations need to be placed on the implementation and its physical media. Nowadays the ever-growing ubiquitous computing calls for in-pace development of security solutions. Although the physical security has attracted increasing public attentio...
متن کاملImproved Channel Estimation for DVB-T2 Systems by Utilizing Side Information on OFDM Sparse Channel Estimation
The second generation of digital video broadcasting (DVB-T2) standard utilizes orthogonal frequency division multiplexing (OFDM) system to reduce and to compensate the channel effects by utilizing its estimation. Since wireless channels are inherently sparse, it is possible to utilize sparse representation (SR) methods to estimate the channel. In addition to sparsity feature of the channel, the...
متن کاملImproved Techniques for Side-Channel Analysis
Over the last several years, side-channel analysis has emerged as a major threat to securing sensitive information in hardware and systems. The list of side-channels that have been (re)discovered include timing [8] micro-architectural anomalies [1, 5, 12, 13], power consumption [9], electromagnetic emanations [2, 7, 14], optical [10, 11] and acoustic leakage [4]. These side-channels have been u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Internet of Things
سال: 2011
ISSN: 2161-6817,2161-6825
DOI: 10.4236/ait.2011.12003