Filters








32 Hits in 4.6 sec

Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance

P.C. van Oorschot, A. Somayaji, G. Wurster
2005 IEEE Transactions on Professional Communication  
Appealing aspects of this approach to software tamper resistance include the promise of being able to verify the integrity of software independent of the external support environment, as well as the ability  ...  The generality and efficiency of our attack suggests that self-hashing is not a viable strategy for high-security tamper resistance on modern computer systems.  ...  The first author acknowledges NSERC for funding an NSERC Discovery Grant and his Canada Research Chair in Network and Software Security.  ... 
doi:10.1109/tdsc.2005.24 fatcat:dugsmq4ugjeubfujudsklqzk5u

Towards Tamper Resistant Code Encryption: Practice and Experience [chapter]

Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere
2008 Lecture Notes in Computer Science  
In recent years, many have suggested to apply encryption in the domain of software protection against malicious hosts.  ...  Our scheme offers maximal protection against both static and dynamic code analysis and tampering. We validate our techniques by applying them on several benchmark programs of the CPU2006 Test Suite.  ...  ), the Concerted Research Action (GOA) Ambiorics 2005/11 of the Flemish Government, and by the BCRYPT Interuniversity Attraction Pole (IAP VI/26) programme of the Belgian government.  ... 
doi:10.1007/978-3-540-79104-1_7 fatcat:hvcg3ip5hne25ivbcege3zfx3q

Virtual machine-provided context sensitive page mappings

Nathan E. Rosenblum, Gregory Cooksey, Barton P. Miller
2008 Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '08  
We demonstrate the utility of our technique in a case study by instrumenting and modifying self-checksumming tamper-resistant binaries.  ...  Previous work has demonstrated several applications of context sensitive page mappings, including protection against buffer-overrun attacks and circumvention of self-checksumming codes.  ...  Acknowledgments This work is supported in part by Department of Energy Grants DE-FG02-93ER25176 and DE-FG02-01ER25510, and National Science Foundataion grant 0627501 The U.S.  ... 
doi:10.1145/1346256.1346268 dblp:conf/vee/RosenblumCM08 fatcat:micojcwh6zddnptiolqg5vhbva

SAFE-OPS: An approach to embedded software security

Joseph Zambreno, Alok Choudhary, Rahul Simha, Bhagi Narahari, Nasir Memon
2005 ACM Transactions on Embedded Computing Systems  
In this paper, we introduce a unique approach to embedded software protection that utilizes a hardware/software codesign methodology.  ...  The growing area of software protection attempts to address the key steps used by hackers in attacking a software system.  ...  ACKNOWLEDGMENTS The authors would like to thank the anonymous referees for their valuable feedback on the earlier drafts of this paper.  ... 
doi:10.1145/1053271.1053279 fatcat:d5yzwdjhtzdhhoezgs4kli4pla

Security Issues and Solutions in Wireless Sensor Networks

Rutuja Jadhav, Vatsala V.
2017 International Journal of Computer Applications  
Then we give a holistic overview of security issues.  ...  Along the way we analyze the advantages and disadvantages of current secure schemes in each category.  ...  WSNs, some implement their schemes by softwarebased, while others use hardware to assist their mechanisms. • Software-based approach: In software-based approaches, such as , rely on optimal program code  ... 
doi:10.5120/ijca2017913256 fatcat:xkjnmdihh5bitpm66p5klr6gfa

Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies [article]

Mark Scanlon
2017 arXiv   pre-print
the use of a variety of worms, botnets, malware, viruses and P2P file sharing.  ...  The types of crimes aided by P2P technology include copyright infringement, sharing of illicit images of children, fraud, hacking/cracking, denial of service attacks and virus/malware propagation through  ...  Collision Resistance The measure of the unlikelihood of two different inputs to a hashing function returning the same hash sum is known as the collision resistance of the hash function.  ... 
arXiv:1712.03455v1 fatcat:brkwhni6vza2dm7ristaj5gyoa

A Study of Security Isolation Techniques

Rui Shu, Peipei Wang, Sigmund A Gorski III, Benjamin Andow, Adwait Nadkarni, Luke Deshotels, Jason Gionta, William Enck, Xiaohui Gu
2016 ACM Computing Surveys  
Security isolation is a foundation of computing systems that enables resilience to different forms of attacks.  ...  We apply our classification to a set of representative papers that cover a breadth of security isolation techniques and discuss trade-offs among different design choices and limitations of existing approaches  ...  Any opinions, conclusions or recommendations expressed in this article are those of the authors and do not necessarily reflect the views of the funding agencies.  ... 
doi:10.1145/2988545 fatcat:5llqb3ghnjgghh2yye4vqslz4y

Humanode Whitepaper: You are [not] a bot [article]

Dato Kavazi, Victor Smirnov, Sasha Shilina, MOZGIII, MingDong Li, Rafael Contreras, Hardik Gajera, Dmitry Lavrenov, the Humanode Core
2021 arXiv   pre-print
The advent of blockchain technology has led to a massive wave of different decentralized ledger technology (DLT) solutions.  ...  All of these implemented technologies have nuances that are crucial for the integrity of the network.  ...  ' of the biometric modality, 'Accuracy' of the biometric method, a low level of 'Circumvention', and the 'Hardware' type used.  ... 
arXiv:2111.13189v1 fatcat:6pc4nj46sjdkvketwydvwh2ulu

Tithonus: A Bitcoin Based Censorship Resilient System

Ruben Recabarren, Bogdan Carbunar
2019 Proceedings on Privacy Enhancing Technologies  
When compared to state-of-the-art Bitcoin writing solutions, Tithonus reduces the cost of transferring data to censored clients by 2 orders of magnitude and increases the goodput by 3 to 5 orders of magnitude  ...  In this paper we introduce Tithonus, a framework that builds on the Bitcoin blockchain and network to provide censorship-resistant communication mechanisms.  ...  -Bitcoin based censorship circumvention.  ... 
doi:10.2478/popets-2019-0005 dblp:journals/popets/RecabarrenC19 fatcat:2pjsytmi7faphmcykdq2wo5zau

Tithonus: A Bitcoin Based Censorship Resilient System [article]

Ruben Recabarren, Bogdan Carbunar
2018 arXiv   pre-print
When compared to state-of-the-art Bitcoin writing solutions, Tithonus reduces the cost of transferring data to censored clients by 2 orders of magnitude and increases the goodput by 3 to 5 orders of magnitude  ...  In this paper we introduce Tithonus, a framework that builds on the Bitcoin blockchain and network to provide censorship-resistant communication mechanisms.  ...  -Bitcoin based censorship circumvention.  ... 
arXiv:1810.00279v1 fatcat:47eagj5sj5cfpgmjo6fx4kpof4

Bank card fraud in Spain

Ricardo M. Mata y. Martin, Antonio Javato Martin
2014 Digital Evidence and Electronic Signature Law Review  
The mass use of cards as a means of payment inevitably gives rise to a significant amount of fraud.  ...  the appearance of new payment systems in the form of bank cards.  ...  information through its system), tamper resistant software, use of cryptographic technology, and that all of these meet or exceed industry standards.  ... 
doi:10.14296/deeslr.v6i0.1860 fatcat:kyerisvgvfdojj65xyihjz2joq

Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture

Dr. Sai Manoj Kudavaralli
2021 Zenodo  
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis  ...  overcome the threats, the installation of firewalls both hardware and software in nature are of high importance.  ...  Although notebook computers and personal digital assistants (PDAs) of today's first-generation are self-contained, networked mobile computers are part of a larger computing infrastructure.  ... 
doi:10.5281/zenodo.5148421 fatcat:lzanqvxdlre2dh3hdhjxibdrim

The Nexus of Copyright and Intellectual Privacy

Alex Cameron
2012 Social Science Research Network  
Without them, and without the support and encouragement of our families (and especially my mother), this project would not have been completed.  ...  In general terms, DRM technologies are embedded in software, hardware, or both, and travel with digital works in order to regulate access to and use of the works. 27 D RM is a kind of "electronic security  ...  Images can be played with, and can work as a form of resistance.  ... 
doi:10.2139/ssrn.2131308 fatcat:tjkgtpk5ancypomii3fcycpfa4

Title Threat modeling and circumvention of Internet censorship Publication Date

Author Fifield, David, David Fifield, David Fifield, J Tygar
2017 unpublished
My research addresses the twin themes of modeling and circumvention.  ...  I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer  ...  The client may be limited, for technical or social reasons, in the software and hardware they can use. The destination may knowingly cooperate with the client's circumvention effort, or may not.  ... 
fatcat:5mwzajvkr5d7fo6a3nsazf4e4i

Threat modeling and circumvention of Internet censorship

David Fifield, David Fifield, J Tygar
2017 unpublished
My research addresses the twin themes of modeling and circumvention.  ...  I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer  ...  The client may be limited, for technical or social reasons, in the software and hardware they can use. The destination may knowingly cooperate with the client's circumvention effort, or may not.  ... 
fatcat:kbnnx5f34vhldmke4zkjg5jblq
« Previous Showing results 1 — 15 out of 32 results