نتایج جستجو برای: tamper shape

تعداد نتایج: 192340  

2005
W. Thompson

We provide a theoretical notion of white-box security for protecting the integrity and privacy of mobile programs. We assume that protecting the program’s semantic privacy will improve the integrity protection of a program, thereby improving tamper resistance and the protection of secret algorithms. We introduce this notion using a Random Oracle Model and describe our important concept of a ran...

2005
Ginger Myles Hongxia Jin

Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, code obfuscation, and tamper detection. In this paper we present a novel dynamic software watermarking algorithm which incorporates ideas from code obfuscation and tamper detection. Our technique simultaneously provid...

2008
Pieter H. Hartel Leon Abelmann Mohammed G. Khatib

We propose a tamper-evident storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by outof-plane magnetisation of individual magnetic dots. We report on measurements showing that in principle the medium also supports a separate class of write-once operation that destroys the out-of-plane magnetisation property of the dots irrev...

Journal: :Pervasive and Mobile Computing 2008
Ghaith Hammouri Erdinç Öztürk Berk Sunar

We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, which shows the scheme to be secure against passive attacks provided that it is hard to learn a threshold of halfspaces under the uniform distribution. Furthermore, we provide an extensive analysis of PUFs. In particula...

2016
Ashutosh Pandey

This paper proposes a novel pixel wise fragile watermarking scheme in spatial domain by which one can effectively locate the tamper in every pixel of the images accurately and scheme is also protected by user defined secret key which is given explicitly. Proposed watermarking algorithms has good PSNR value and have less complexity of algorithms. Proposed algorithms can also work on color images...

2000
Lisa M. Marvel George W. Hartwig Charles G. Boncelet

In this paper, we present two tamper-detection techniques. The rst is a fragile technique that can detect the most minor changes in a marked image using a DCT-based data hiding method to embed a tamper-detection mark. The second is a semi-fragile technique that detects the locations of signiicant manipulations while disregarding the less important eeects of image compression and additive channe...

1996
Ross Anderson Markus Kuhn

An increasing number of systems, from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security processors. We describe a number of attacks on such systems — some old, some new and some that are simply little known outside the chip testing community. We conclude that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device t...

Journal: :IEEE Transactions on Dependable and Secure Computing 2005

Journal: :Journal of Pharmaceutical Care & Health Systems 2014

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید