نتایج جستجو برای: countermeasure

تعداد نتایج: 4411  

2009
CAROL A. FLANNAGAN MICHAEL J. FLANNAGAN Carol A. Flannagan Michael J. Flannagan

The Unified Tool for Mapping Opportunities for Safety Technology (UTMOST) is a model of crash data that incorporates the complex relationships among different vehicle and driver variables. It is designed to visualize the effect of multiple safety countermeasures on elements of the driver, vehicle, or crash population. We have recently updated UTMOST to model the effects of the time-course of fl...

Journal: :IACR Cryptology ePrint Archive 2015
Sikhar Patranabis Abhishek Chakraborty Debdeep Mukhopadhyay

Infective countermeasures have been a promising class of fault attack countermeasures. However, they have been subjected to several attacks owing to lack of formal proofs of security and improper implementations. In this paper, we first provide a formal information theoretic proof of security for one of the most recently proposed infective countermeasures against DFA, under the assumption that ...

Journal: :Human factors 2011
Frédéric Dehais Mickaël Causse Sébastien Tremblay

OBJECTIVE The aim of this study was to empirically assess the efficacy of cognitive countermeasures based on the technique of information removal to enhance human operator attentional disengagement abilities when facing attentional tunneling. BACKGROUND Lessons learned from human factors studies suggest that conflict with automation leads to the degradation of operators' performance by promot...

2001
Dong Xuan Shengquan Wang Ye Zhu Riccardo Bettati Wei Zhao

We describe a defense system to contain Distributed Denial-of-Service (DDoS) flooding attacks in highspeed networks. We aim at protecting TCP friendly traffic, which forms a large portion of Internet traffic. DDoS flooding attacks tend to establish large numbers of malicious traffic flows to congest network. These flows are marked as TCP flows, and use spoofed source identifiers to hide their i...

2015
Liwei Zhang A. Adam Ding Yunsi Fei Pei Luo

To design effective countermeasures for cryptosystems against side-channel power analysis attacks, the evaluation of the system leakage has to be lightweight and often times at the early stage like on cryptographic algorithm or source code. When real implementations and power leakage measurements are not available, security evaluation has to be through metrics for the information leakage of alg...

Journal: :IEEE Transactions on Information Forensics and Security 2021

This study investigates a new side-channel leakage observed in the inner rounds of an unrolled hardware implementation block ciphers chosen-input attack scenario. The occurs first round and it can be later because arises from path activation bias caused by difference between two consecutive inputs. Therefore, that exploits is possible even for implementations equipped with countermeasures (mask...

2010
Mathilde DUCLOS

1 Background 2 1.1 Characterization of Anonymous Channel Based on Indistinguishability . . . . . . . . . . . . 2 1.1.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 Relations Proven . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 A Provably Secure And Efficient Countermeasure Against Timing Attacks . . . . . . . ...

Journal: :IACR Cryptology ePrint Archive 2012
François Durvaux Mathieu Renauld François-Xavier Standaert Loïc van Oldeneel tot Oldenzeel Nicolas Veyrat-Charvillon

Inserting random delays in cryptographic implementations is often used as a countermeasure against side-channel attacks. Most previous works on the topic focus on improving the statistical distribution of these delays. For example, efficient random delay generation algorithms have been proposed at CHES 2009/2010. These solutions increase security against attacks that solve the lack of synchroni...

2013
Amir Moradi Oliver Mischke

Because of the isomorphisms in GF(2) there exist 240 different non-trivial dual ciphers of AES. While keeping the inand outputs of a dual cipher equal to the original AES, all the intermediate values and operations can be different from that of the original one. A comprehensive list of these dual ciphers is given by an article presented at ASIACRYPT 2002, where it is mentioned that they might b...

Journal: :IACR Cryptology ePrint Archive 2015
Alexandre Duc Sebastian Faust François-Xavier Standaert

We investigate the relationships between theoretical studies of leaking cryptographic devices and concrete security evaluations with standard side-channel attacks. Our contributions are in four parts. First, we connect the formal analysis of the masking countermeasure proposed by Duc et al. (Eurocrypt 2014) with the Eurocrypt 2009 evaluation framework for side-channel key recovery attacks. In p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید