Filters








27,135 Hits in 6.7 sec

A covert data transport protocol

Yu Fu, Zhe Jia, Lu Yu, Xingsi Zhong, Richard Brooks
2016 2016 11th International Conference on Malicious and Unwanted Software (MALWARE)  
In this paper, we describe a data transport layer which allows a client to transfer encrypted data that provides no discernible information regarding the data source.  ...  We use a domain generation algorithm (DGA) to encode AES encrypted data into domain names that current tools are unable to reliably differentiate from valid domain names.  ...  Acknowledgment This material is based in whole or in part upon work supported by the National Science Foundation under Grant numbers ACI-1547164 and CNS-1544910.  ... 
doi:10.1109/malware.2016.7888734 dblp:conf/malware/FuJYZB16 fatcat:6hqkq5naa5hb5lbgsnxucldova

Data Analysis Techniques [chapter]

Michael Tunick
2008 Handbook of Food Analysis Instruments  
channels, I56 binary events, and 9 counter channels.  ...  Input Sampling -the sampling plan is arranged as follows: 160 differential input low-level channels at 10 s/s 2I+O differential input high-level channels at 10 s/s 1+0 differential input high-level channels  ...  JCKE,NPTS,TENP,NCGC 9132 FCRMAT(2X, I4,4X,I5,5X, 12A6i2X, 71-CELE TEC , 16 ,2 X , ICHPC I NTS CLT) GC TC 6 END FAP LABEL RCE6 CALLINGSEQUENCE CALL RCe6(NCHB6,NPTS,TMIN,T^AX,TSTG,YSTG,TEMP,TI TIE,IN  ... 
doi:10.1201/9781420045673.ch1 fatcat:p2kkerx2g5ddthbquzjqnag4qu

Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA [chapter]

Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
2003 Lecture Notes in Computer Science  
This paper proposes an alternative DPA using the addresses of registers of elliptic curve based cryptosystems (ECC) implemented on smart cards. We call the analysis the address-bit DPA in this paper.  ...  We extend the analysis and show how the extended analysis works against scalar exponentiations even if the implementation is resistant against the data-based DPA.  ...  At the moment, the Simple Power Analysis (SPA) and the Differential Power Analysis (DPA) are typical examples of the side channel attacks.  ... 
doi:10.1007/3-540-36400-5_11 fatcat:u6xapwzlsrhebkr5ox2bw5pwpm

Analysis of Software Countermeasures for Whitebox Encryption

Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Jepsen
2017 IACR Transactions on Symmetric Cryptology  
The attack passively collects software execution traces for several plaintext encryptions and uses the collected data to perform an analysis similar to the well known differential power attacks (DPA) to  ...  The first known as Differential Computational Analysis (DCA) attack was developed by Bos, Hubain, Michiels and Teuwen in CHES 2016.  ...  Differential Computation Analysis (DCA) A side channel attack called a differential computation analysis has been proposed by Bos et al. [BHMT16] and Sanfelix et al. at Black Hat Europe [SMdH15] .  ... 
doi:10.46586/tosc.v2017.i1.307-328 fatcat:ir7u5lyx6bhufj6fmsde7p3zlq

Analysis of Software Countermeasures for Whitebox Encryption

Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Jepsen
2017 IACR Transactions on Symmetric Cryptology  
The attack passively collects software execution traces for several plaintext encryptions and uses the collected data to perform an analysis similar to the well known differential power attacks (DPA) to  ...  The first known as Differential Computational Analysis (DCA) attack was developed by Bos, Hubain, Michiels and Teuwen in CHES 2016.  ...  Differential Computation Analysis (DCA) A side channel attack called a differential computation analysis has been proposed by Bos et al. [BHMT16] and Sanfelix et al. at Black Hat Europe [SMdH15] .  ... 
doi:10.13154/tosc.v2017.i1.307-328 dblp:journals/tosc/BanikBIJ17 fatcat:6sbscn4hirgcppwbpv6bqaau7y

Differential Power Analysis of XMSS and SPHINCS [chapter]

Matthias J. Kannwischer, Aymeric Genêt, Denis Butin, Juliane Krämer, Johannes Buchmann
2018 Lecture Notes in Computer Science  
No rigorous side-channel analysis of hash-based signature schemes has been conducted so far. This work bridges this gap.  ...  We present novel differential power analyses on a SHA-2-based pseudorandom number generator for XMSS and a BLAKE-256-based pseudorandom function for SPHINCS-256 in the Hamming weight model.  ...  Acknowledgments We would like to thank Hervé Pelletier and Roman Korkikian from Kudelski Group for their help and expertise in the practical verification of the DPA on BLAKE-256.  ... 
doi:10.1007/978-3-319-89641-0_10 fatcat:2okqnkhqpze2nikcmjkpstzmny

Revealing Lung Affections from CTs. A Comparative Analysis of Various Deep Learning Approaches for Dealing with Volumetric Data [article]

Radu Miron, Cosmin Moisii, Mihaela Breaban
2020 arXiv   pre-print
Three classes of methods, different with respect to the way the volumetric data is given as input to neural network-based classifiers are discussed and evaluated.  ...  All these come with a rich experimental analysis comprising a variety of neural network architectures, various segmentation algorithms and data augmentation schemes.  ...  Acknowledgements Our strong belief is that data science without domain knowledge can never reach its full potential.  ... 
arXiv:2009.04160v1 fatcat:cftyaxevzbc7zam7zviaxniz5e

Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough [chapter]

Joppe W. Bos, Charles Hubain, Wil Michiels, Philippe Teuwen
2016 Lecture Notes in Computer Science  
We developed plugins to widely available dynamic binary instrumentation frameworks to produce software execution traces which contain information about the memory addresses being accessed.  ...  This differential computation analysis (DCA) attack is the software counterpart of the differential power analysis attack as applied by the cryptographic hardware community.  ...  ., in terms of timing or power consumption. This side-channel analysis gave rise to the gray-box attack model.  ... 
doi:10.1007/978-3-662-53140-2_11 fatcat:vchh5a4ddnh2hfwvioakgehwz4

Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers [article]

Madura A Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom
2020 arXiv   pre-print
Since their introduction over two decades ago, physical side-channel attacks have presented a serious security threat.  ...  While many ciphers' implementations employ masking techniques to protect against such attacks, they often leak secret information due to unintended interactions in the hardware.  ...  ELMO then performs a linear regression on the data collected in the traces to find the coefficients for the model.  ... 
arXiv:1912.05183v3 fatcat:dndroxdtbjguxm7oc7jvycauhq

Automatic Application of Power Analysis Countermeasures

Ali Galip Bayrak, Francesco Regazzoni, David Novo, Philip Brisk, Francois-Xavier Standaert, Paolo Ienne
2015 IEEE transactions on computers  
We introduce a compiler that automatically inserts software countermeasures to protect cryptographic algorithms against power-based side-channel attacks.  ...  This information is obtained either by dynamic analysis, evaluating an information theoretic metric over the power traces acquired during the execution of the input program, or by static analysis.  ...  The compiler can analyze the traces of real side-channel measurements (power traces, in our case) if the user provides traces; alternatively, it can perform static analysis. 2) Transformation Target Identification  ... 
doi:10.1109/tc.2013.219 fatcat:l2tviwta5ndzhk3oftmkv3jevy

On XTR and Side-Channel Analysis [chapter]

Daniel Page, Martijn Stam
2004 Lecture Notes in Computer Science  
Over the past few years, there has been a large volume of work on both attacking elliptic curve cryptosystems (ECC) using side-channel analysis and the development of related defence methods.  ...  These properties make XTR ideal for use on smart-cards, the devices that suffer most from vulnerability to side-channel attack.  ...  Side-Channel Analysis At the heart of power analysis is the concept of power traces.  ... 
doi:10.1007/978-3-540-30564-4_4 fatcat:vrowulchzndebarhfokl7f37le

A Novel and Efficient countermeasure against Power Analysis Attacks using Elliptic Curve Cryptography

M Prabu, R.Shanmugalakshmi
2010 International Journal of Advanced Computer Science and Applications  
The theoretical analysis based on these result has been shown and it represents how the algorithm design should fluctuate from the facade side channel attacks.  ...  An algorithm design based on power analysis is also described and it makes our countermeasure more secure against simple power analysis, differential power analysis and other attacks.  ...  These information leakages are known as side channel information. Side channel attacks are based on these side channel information.  ... 
doi:10.14569/ijacsa.2010.010204 fatcat:tg34t7eobbaybnsfyhveexyw64

Compiler Optimizations as a Countermeasure against Side-Channel Analysis in MSP430-Based Devices

Pedro Malagón, Juan-Mariano de Goyeneche, Marina Zapater, José M. Moya, Zorana Banković
2012 Sensors  
Side-channel analysis (SCA) easily exploits leakages from the execution of encryption algorithms that are dependent on critical data to guess the key value.  ...  We propose an optimization-based software countermeasure that can be used in current low-cost devices to radically increase resistance against statistical SCA, analyzed with the new framework.  ...  solution improve resistance against side-channel analysis?  ... 
doi:10.3390/s120607994 pmid:22969383 pmcid:PMC3436012 fatcat:23g5qmwcrbc3peetqdacybixzm

Automated Side Channel Analysis of Media Software with Manifold Learning [article]

Yuanyuan Yuan, Qi Pang, Shuai Wang
2021 arXiv   pre-print
be addressed in a unified manner with an autoencoder framework trained to learn the mapping between media inputs and side channel observations.  ...  Recent advances in representation learning and perceptual learning inspired us to consider the reconstruction of media inputs from side channel traces as a cross-modality manifold learning task that can  ...  manifold of media data and side channel traces.  ... 
arXiv:2112.04947v2 fatcat:sfuail7w3faptgvufnaroqwdc4

Analysis of Data-At-Rest Security In Smartphones

Ildar Muslukhov
2018 Zenodo  
Finally, an in-depth analysis of the top libraries highlighted the need for improvement in the way we define and detect misuse of cryptography.  ...  To understand how well users are protecting their data in smartphones, we conducted several studies.  ...  In particular, one can use Java Reflection API to side-load a binary that would make the actual call to Crypto API.  ... 
doi:10.5281/zenodo.3264745 fatcat:cbrrlqwup5fubjlr4ehnikdixq
« Previous Showing results 1 — 15 out of 27,135 results