نتایج جستجو برای: Software Countermeasure

تعداد نتایج: 441146  

2011
Kazuki MORI Daisuke KINOSHITA Seiichi KOMIYA

The authors have been developing the automatic scheduling systems for software development project, which deliver scheduling and worker assignment. Their earlier works were designed to draw on crashing and fast tracking to produce countermeasure plans against process delay. However, process delay can be recovered not only by crashing or fast tracking but also by using holiday works. Their earli...

Journal: :IACR Cryptology ePrint Archive 2014
Cong Chen Thomas Eisenbarth Aria Shahverdi Xin Ye

Most side channel countermeasures for software implementations of cryptography either rely on masking or randomize the execution order of the cryptographic implementation. This work proposes a countermeasure that has constant leakage in common linear leakage models. Constant leakage is achieved not only for internal state values, but also for their transitions. The proposed countermeasure provi...

Journal: :Journal of the Korea Institute of Information and Communication Engineering 2013

2013
Le Minh Sang Tran

Existing risk assessment methods often rely on a context of a target software system at a particular point in time. Such contexts of long-living software systems tend to evolve over time. Consequently, risks might also evolve. Therefore, in order to deal with evolving risks, decision makers need to select an appropriate risk countermeasure alternative that is more resilient to evolution than ot...

Journal: :Cryptography 2021

CONFISCA is the first generic SIMD-based software countermeasure that can concurrently resist against Side-Channel Attack (SCA) and Fault Injection (FI). Its promising strength presented in a PRESENT cipher case study compared to software-based Dual-rail with Pre-charge Logic concurrent countermeasure. It has lower overhead, wider usability, higher protection. protection been using Correlation ...

2002
Li-Chiou Chen Kathleen M. Carley

How can virus countermeasures such as software patches or warnings be disseminated and installed more efficiently than they are currently so that fewer organizations will suffer virus infection problems? The relative effectiveness of four anti-virus strategies is examined formally using simulations. One of these strategies is the countermeasure spreading strategy (CMS). CMS is based on the idea...

Journal: :IACR Cryptology ePrint Archive 2009
Jean-Sébastien Coron Ilya Kizhvatov

Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of random delays and a criterion for measuring the efficiency of a random delay countermeasure. We implement this new method along with the existing ones on an 8-bit platform and mount practical side-channel attacks against t...

2005
Nikita Borisov Robert Johnson

Dean and Hu proposed a probabilistic countermeasure to the classic access(2)/open(2) TOCTTOU race condition in privileged Unix programs [4]. In this paper, we describe an attack that succeeds with very high probability against their countermeasure. We then consider a stronger randomized variant of their defense and show that it, too, is broken. We conclude that access(2) must never be used in p...

Journal: :IACR Cryptology ePrint Archive 2012
Houssem Maghrebi Emmanuel Prouff Sylvain Guilley Jean-Luc Danger

One protection of cryptographic implementations against sidechannel attacks is the masking of the sensitive variables. In this article, we present a first-order masking that does not leak information when the registers change values according to some specific (and realistic) rules. This countermeasure applies to all devices that leak a function of the distance between consecutive values of inte...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید