نتایج جستجو برای: software countermeasure

تعداد نتایج: 441146  

2005
G. Fraidy Bouesse Marc Renaudin Gilles Sicard

The purpose of this paper is to propose a design technique for improving the resistance of the Quasi Delay Insensitive (QDI) Asynchronous logic against Differential Power Analysis Attacks. This countermeasure exploits the properties of the QDI circuit acknowledgement signals to introduce temporal variations so as to randomly desynchronize the data processing times. The efficiency of the counter...

2011
Francesco Regazzoni Yi Wang François-Xavier Standaert

Power analysis attacks are a serious treat for implementations of modern cryptographic algorithms. Masking is a particularly appealing countermeasure against such attacks since it increases the security to a well quantifiable level and can be implemented without modifying the underlying technology. Its main drawback is the performance overhead it implies. For example, due to prohibitive memory ...

2008
Theocharis Tsigkritis George Spanoudakis

The monitoring of properties of complex software systems can provide the core functionality for detecting violations of such properties. However, the violations detection cannot be always sufficient for the preservation of the properties. Except for the detection, the explanations of the occurrence of a violation could play significant role for the preservation task. In particular, diagnosis ca...

2008
Naofumi Homma Atsushi Miyamoto Takafumi Aoki Akashi Satoh Adi Shamir

This paper proposes new chosen-message power-analysis attacks against public-key cryptosystems based on modular exponentiation, which use specific input pairs to generate collisions between squaring operations at different locations in the two power traces. Unlike previous attacks of this kind, the new attacks can be applied to all the standard implementations of the exponentiation process: bin...

2016
Sonali R. Khobragade

In this modern era where technology plays an important role, persons can be recognized (for security reasons) depending upon their behavioral and physiological characteristics (for example fingerprint, face, iris, keystroke,signature, voice, etc.) such systems are known as biometric systems . In these kind of systems the security is still a question mark because of various intruders and attacks...

2011
Mark Beaumont Bradley Hopkins Tristan Newby

A Hardware Trojan is a malicious, undesired, intentional modification of an electronic circuit or design, resulting in the incorrect behaviour of an electronic device when in operation – a back-door that can be inserted into hardware. A Hardware Trojan may be able to defeat any and all security mechanisms (software or hardware-based) and subvert or augment the normal operation of an infected de...

2013
Amir Moradi Sylvain Guilley Annelie Heuser

Reducing the entropy of the mask is a technique which has been proposed to mitigate the high performance overhead of masked software implementations of symmetric block ciphers. Rotating S-box Masking (RSM) is an example of such schemes applied to AES with the purpose of maintaining the security at least against univariate first-order side-channel attacks. This article examines the vulnerability...

2012
Pedro Malagón Juan-Mariano de Goyeneche Marina Zapater José Manuel Moya Zorana Bankovic

Ambient Intelligence (AmI) requires devices everywhere, dynamic and massively distributed networks of low-cost nodes that, among other data, manage private information or control restricted operations. MSP430, a 16-bit microcontroller, is used in WSN platforms, as the TelosB. Physical access to devices cannot be restricted, so attackers consider them a target of their malicious attacks in order...

2014
Hiroaki Murakami Keisuke Hotta Yoshiki Higo Shinji Kusumoto

Changing source code is not an easy task. Developers occasionally change source code incorrectly or overlook code fragments that need to be changed. Such mistakes entail additional cost in having to reedit the source code correctly, and repeated changes themselves can be a hazard to software quality. We are conducting research into realizing automated code changing as a countermeasure for human...

2012
Prof.Puram.Pradeep Kumar Naini Shekar Reddy Saleha Saudagar

Peer-to-Peer (P2P) Networks continue to be popular means of trading content. However the files exchanged in these networks are not malicious, making them an ideal medium for spreading Malware. Some existing studies have shown that Malware proliferation can pose significant threats to P2P Networks, defending against such an attack are largely an open problem. This paper aims to develop the count...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید