نتایج جستجو برای: tamper shape
تعداد نتایج: 192340 فیلتر نتایج به سال:
We provide a theoretical notion of white-box security for protecting the integrity and privacy of mobile programs. We assume that protecting the program’s semantic privacy will improve the integrity protection of a program, thereby improving tamper resistance and the protection of secret algorithms. We introduce this notion using a Random Oracle Model and describe our important concept of a ran...
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, code obfuscation, and tamper detection. In this paper we present a novel dynamic software watermarking algorithm which incorporates ideas from code obfuscation and tamper detection. Our technique simultaneously provid...
We propose a tamper-evident storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by outof-plane magnetisation of individual magnetic dots. We report on measurements showing that in principle the medium also supports a separate class of write-once operation that destroys the out-of-plane magnetisation property of the dots irrev...
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, which shows the scheme to be secure against passive attacks provided that it is hard to learn a threshold of halfspaces under the uniform distribution. Furthermore, we provide an extensive analysis of PUFs. In particula...
This paper proposes a novel pixel wise fragile watermarking scheme in spatial domain by which one can effectively locate the tamper in every pixel of the images accurately and scheme is also protected by user defined secret key which is given explicitly. Proposed watermarking algorithms has good PSNR value and have less complexity of algorithms. Proposed algorithms can also work on color images...
In this paper, we present two tamper-detection techniques. The rst is a fragile technique that can detect the most minor changes in a marked image using a DCT-based data hiding method to embed a tamper-detection mark. The second is a semi-fragile technique that detects the locations of signiicant manipulations while disregarding the less important eeects of image compression and additive channe...
An increasing number of systems, from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security processors. We describe a number of attacks on such systems — some old, some new and some that are simply little known outside the chip testing community. We conclude that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید