نتایج جستجو برای: Countermeasure
تعداد نتایج: 4411 فیلتر نتایج به سال:
driver fatigue may impose the risk of crashes and is a leading cause of death in transportation industry. this study aimed to detect driver cognitive fatigue based on changes in eeg frequency bands in non-professional drivers during a simulated driving task. in a descriptive-analytical study, 12 healthy male car drivers took part in a two hour driving session on a simulated monotonous road, whi...
UNLABELLED We previously found that simultaneously executing a mental countermeasure and an explicit required response impairs reaction time (RT)-based detection of countermeasure use in a P300- based concealed information test. To address this issue, we increased the numbers of irrelevant stimuli to eight, and manipulated the proportions of to-be-countered irrelevant stimuli from 25% to 50% to...
To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...
Recently new types of differential power analysis attacks (DPA) against elliptic curve cryptosystems (ECC) and RSA systems have been introduced. Most existing countermeasures against classical DPA attacks are vulnerable to these new DPA attacks which include refined power analysis attacks (RPA), zero-value point attacks (ZPA), and doubling attacks. The new attacks are different from classical D...
At CHES 2006, a DPA countermeasure based on the Fourier Transform was published. This generic countermeasure aims at protecting from DPA any S-box calculation used in symmetric cryptosystems implementations. In this paper, we show that this countermeasure has a flaw and that it can be broken by first order DPA. Moreover, we have successfully put into practice our attack on two different S-box i...
Researchers have demonstrated the ineffectiveness of deterministic countermeasures and emphasized on the use of randomness for protecting cryptosystems against fault attacks. One such countermeasure for AES was proposed in LatinCrypt 2012, which masks the faulty output with secret values. However this countermeasure does not affect the erroneous byte in the faulty computation of the last AES ro...
Horizontal collision correlation analysis (HCCA) imposes a serious threat to simple power analysis resistant elliptic curve cryptosystems involving unified algorithms, for e.g. Edward curve unified formula. This attack can be mounted even in presence of differential power analysis resistant randomization schemes. In this paper we have designed an effective countermeasure for HCCA protection, wh...
Horizontal collision correlation analysis (HCCA) imposes a serious threat to simple power analysis resistant elliptic curve cryptosystems involving unified algorithms, for e.g. Edward curve unified formula. This attack can be mounted even in presence of differential power analysis resistant randomization schemes. In this paper we have designed an effective countermeasure for HCCA protection, wh...
We show that a randomized addition-subtraction chains countermeasure against side channel attacks is vulnerable to SPA attack, a kind of side channel attack, under distinguishability between addition and doubling. A side channel attack is an attack that takes advantage of information leaked during execution of a cryptographic procedure. The randomized addition-subtraction chains countermeasure ...
BIODEFENSE PLANNING BY THE U.S. government emphasizes the use of medical countermeasures, including drugs and vaccines, to prepare for and respond to attacks involving biological weapons.1–4 Currently, medical countermeasures are available for only a fraction of biological threats, including those representing the highest risk, as determined by the Department of Homeland Security’s (DHS) threat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید