نتایج جستجو برای: timing attacks

تعداد نتایج: 142928  

Journal: :Fundam. Inform. 2007
Damas P. Gruska

A formal model for description of passive and active timing attacks is presented, studied and compared with other security concepts. It is based on a timed process algebra and on a concept of observations which make only a part of system behaviour visible. From this partial information which contains also timing of actions an intruder tries to deduce some private system activities.

2012
M. Renukadevi N. Bhaskar R. Prabu

Traffic analysis is typically countered by the use of intermediary nodes, whose role is to perturb the traffic flow and thus confuse an external observer. Such intermediaries are called mixes. We address attacks that exploit the timing behaviour of TCP and other protocols and applications in low-latency anonymity networks. Intermediaries delay and reroute exchanged messages, reorder them, pad t...

Journal: :ACM Transactions in Embedded Computing Systems 2023

Industrial control systems (ICSs) consist of a large number applications that are associated with periodic real-time flows hard deadlines. To facilitate large-scale integration, remote and co-ordination, wireless sensor actuator networks (WSANs) form the main communication framework in most ICSs. Among existing WSAN protocols, WirelessHART is suitable protocol for The communications network tim...

2013
Carlos Moreno

Side-Channel Analysis plays an important role in cryptology, as it represents an important class of attacks against cryptographic implementations, especially in the context of embedded systems such as hand-held mobile devices, smart cards, RFID tags, etc. These types of attacks bypass any intrinsic mathematical security of the cryptographic algorithm or protocol by exploiting observable side-ef...

2012
Sebastian Schinzel

Side channels are vulnerabilities that can be attacked by observing the behaviour of applications and by inferring sensitive information just from this behaviour. Because side channel vulnerabilities appear in such a large spectrum of contexts, there does not seem to be a generic way to prevent all side channel attacks once and for all. A practical approach is to research for new side channels ...

2011
Peng Li Debin Gao Michael K. Reiter

This paper describes StopWatch , a system that defends against timing-based side-channel attacks that arise from coresidency of victims and attackers in infrastructureas-a-service cloud environments. StopWatch triplicates each cloud-resident guest virtual machine (VM) and places replicas so that the three replicas of a guest VM are coresident with nonoverlapping sets of (replicas of) other VMs....

Journal: :I. J. Circuit Theory and Applications 2017
Davide Bellizia Milena Djukanovic Giuseppe Scotti Alessandro Trifiletti

Side-channel attacks are a serious threat to security-critical software. OpenSSL is a prime security attack target due to the library’s ubiquitous real world applications, therefore, the history of cache-timing attacks against OpenSSL is varied and rich. The presentation includes a brief history of cache-timing attacks in OpenSSL. To mitigate remote timing and cache-timing attacks, many ubiquit...

Journal: :Lecture Notes in Computer Science 2023

Abstract Many types of attacks on confidentiality stem from the nondeterministic nature environment that computer programs operate in. We focus verification in environments by reasoning about asynchronous hyperproperties . generalize temporal logic to allow nested trajectory quantification, where a determines how different execution traces may advance and stutter. propose bounded model checking...

2017
Marc Green

As Moore’s law continues to reduce the cost of computation at an exponential rate, embedded computing capabilities spread to ever-expanding application scenarios, such as smartphones, the Internet of Things, and automation, among many others. This trend has naturally caused the underlying technology to evolve and has introduced increasingly complex microarchitectures into embedded processors in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید