نتایج جستجو برای: software countermeasure

تعداد نتایج: 441146  

Journal: : 2023

The article proposes the creation of an effective system for detecting and responding to external influences in order minimize consequences breaching protection cloud virtual resources a timely manner. Mathematical models have been improved ensure software-configured networks, namely: mathematical model impact attack on resources, assessing state choosing countermeasure based complex indicator ...

In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...

2002
Christian Aumüller Peter Bier Wieland Fischer Peter Hofreiter Jean-Pierre Seifert

This article describes concrete results and practically validated countermeasures concerning differential fault attacks on RSA using the CRT. We investigate smartcards with an RSA coprocessor where any hardware countermeasures to defeat fault attacks have been switched off. This scenario was chosen in order to analyze the reliability of software countermeasures. We start by describing our labor...

2002
Katsuyuki Okeya Kouichi Sakurai

We show that a randomized addition-subtraction chains countermeasure against side channel attacks is vulnerable to SPA attack, a kind of side channel attack, under distinguishability between addition and doubling. A side channel attack is an attack that takes advantage of information leaked during execution of a cryptographic procedure. The randomized addition-subtraction chains countermeasure ...

2007
Jason Matheny Michael Mair Andrew Mulcahy Bradley T. Smith

BIODEFENSE PLANNING BY THE U.S. government emphasizes the use of medical countermeasures, including drugs and vaccines, to prepare for and respond to attacks involving biological weapons.1–4 Currently, medical countermeasures are available for only a fraction of biological threats, including those representing the highest risk, as determined by the Department of Homeland Security’s (DHS) threat...

2013
Raúl Jiménez-Naharro Juan Antonio Gómez Galán Manuel Sanchez-Raya Fernando Gómez-Bravo Manuel Pedro Carrasco

A new digital countermeasure against attacks related to the clock frequency is presented. This countermeasure, known as frequency sensor, consists of a local oscillator, a transition detector, a measurement element and an output block. The countermeasure has been designed using a full-custom technique implemented in an Application-Specific Integrated Circuit (ASIC), and the implementation has b...

2010
Carlos Moreno Anwar Hasan

Successful timing attacks against public-key cryptosystems have been demonstrated in many forms, suggesting the use of a technique known as blinding as countermeasure to these attacks. An alternative countermeasure has been considered, though somewhat overlooked and less studied in existing literature, consisting of idle-wait to make the decryption time independent of the data. In this work, we...

2012
Kohei Arai

Countermeasure for round trip delay which occurs in between satellite and ground with network accelerator is investigated together with operating system dependency on effectiveness of accelerator. Also disaster relief data transmission experiments are conducted for mitigation of disaster together with acceleration of disaster related data transmission between local government and disaster preve...

Journal: :Computer Communications 2006
Rolf Oppliger Ralf Hauser David A. Basin

Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed user authentication mechanisms fail to provide protection against this type of attack, even when they run on top of SSL/TLS. As a possible countermeasure, we introduce the notion of SSL/TLS session-aware user authentication, and p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید