Filters








3,163 Hits in 4.5 sec

Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations

Olivier Bronchain, François-Xavier Standaert
<span title="2020-03-02">2020</span> <i title="IACR Transactions on Cryptographic Hardware and Embedded Systems"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yz7ssmvstjhsxiwixprnmyijnq" style="color: black;">Transactions on Cryptographic Hardware and Embedded Systems</a> </i> &nbsp;
information extraction and key enumeration can recover the full key with less than 2,000 measurements.  ...  Our findings are not due to design flaws but from the general difficulty to prevent side-channel attacks in COTS devices with limited noise.  ...  Acknowledgements The authors thank the members of the ANSSI team for their constructive and useful feedback about our results, as well as for providing us the traces they used for their preliminary leakage  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2020.i2.1-25">doi:10.13154/tches.v2020.i2.1-25</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/tches/BronchainS20.html">dblp:journals/tches/BronchainS20</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/x37j6ktpizfqxczzbkh56vz6we">fatcat:x37j6ktpizfqxczzbkh56vz6we</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200308000358/https://tches.iacr.org/index.php/TCHES/article/download/8542/8107" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/eb/6deb4d22babe8c8bd77e5ad0506692d0c7e25fce.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2020.i2.1-25"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

On the Role Definitions in and Beyond Cryptography [chapter]

Phillip Rogaway
<span title="">2004</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
More than new algorithms, proofs, or technologies, it is the emergence of definitions that has changed the landscape of cryptography.  ...  We describe how definitions work in modern cryptography, giving a number of examples, and we provide observations, opinions, and suggestions about the art and science of crafting them.  ...  I received helpful comments from Mihir Bellare, John Black, Chanathip Namprempre, and Tom Shrimpton. This note was written with funding from NSF 0208842 and a gift from Cisco Systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30502-6_2">doi:10.1007/978-3-540-30502-6_2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/a7dlexoq45blzl6pfzzalnwisi">fatcat:a7dlexoq45blzl6pfzzalnwisi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20050513204513/http://www.cs.ucdavis.edu:80/%7Erogaway/papers/def.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c8/1d/c81d766f122f805d742f222c793cf2b3d6d7ca5c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30502-6_2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

On the Practical Feasibility of Secure Multipath Communication

Stefan Rass, Benjamin Rainer, Stefan Schauer
<span title="">2013</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
Since this form of secret communication works without secret keys, the risk of human failure in key management naturally vanishes, leaving security to rest only on the network management.  ...  Secure multipath transmission (MPT) uses network path redundancy to achieve privacy in the absence of public-key encryption or any shared secrets for symmetric encryption.  ...  ACKNOWLEDGMENT This work has been supported by the Austrian Research Promotion Agency, under research grants no. 836287 and 829570.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2013.041016">doi:10.14569/ijacsa.2013.041016</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cylxznvygvf77f2z33k4myv3ey">fatcat:cylxznvygvf77f2z33k4myv3ey</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706060848/http://thesai.org/Downloads/Volume4No10/Paper_16-On_the_Practical_Feasibility_of_Secure_Multipath_Communication.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/aa/bf/aabf082d5639d8cb0dcf476ac09037e829550aff.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2013.041016"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Algorithmic Information Theory for Obfuscation Security

Rabih Mohsen, Alexandre Miranda Pinto
<span title="">2015</span> <i title="SCITEPRESS - Science and and Technology Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tucwymxjpnhgdnuki4g66gio5q" style="color: black;">Proceedings of the 12th International Conference on Security and Cryptography</a> </i> &nbsp;
to be leaked to an adversary.  ...  The main problem in designing effective code obfuscation is to guarantee security.  ...  Human comprehension is a key in this case; an adversary has to understand the obfuscated code in order to recover the original.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0005548200760087">doi:10.5220/0005548200760087</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/secrypt/MohsenP15.html">dblp:conf/secrypt/MohsenP15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ipuwyhntiffx7hv7cjaap7pubi">fatcat:ipuwyhntiffx7hv7cjaap7pubi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151022134833/http://eprint.iacr.org/2015/793.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6f/92/6f9250fb34a5b02b351e62e6cef85b0649c5ed85.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0005548200760087"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems

Peter Maynard, Kieran McLaughlin, Sakir Sezer
<span title="2020-01-01">2020</span> <i title="Oxford University Press (OUP)"> Journal of Cybersecurity </i> &nbsp;
The resulting commonalities can be used to develop improved detection strategies to detect modern adversarial techniques and tactics.  ...  We perform a detailed survey and analysis of the most significant attacks, which have targeted industrial control systems over the past decade, based on detailed incident reports from scientific and non-traditional  ...  Acknowledgements The authors wish to thank the anonymous reviewers for their valued feedback and time, in reviewing this article.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/cybsec/tyaa020">doi:10.1093/cybsec/tyaa020</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5dlghphmsze4nklma6iaow7hly">fatcat:5dlghphmsze4nklma6iaow7hly</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210427165009/https://pureadmin.qub.ac.uk/ws/files/225787435/decompo.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/21/ae/21aec4c7a05b2b04848050721680a9ee76e0ab31.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/cybsec/tyaa020"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> oup.com </button> </a>

Automatically deriving information-theoretic bounds for adaptive side-channel attacks

Boris Köpf, David Basin
<span title="2011-02-14">2011</span> <i title="IOS Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/spxf4rshtfhgvoxv3apocfge6m" style="color: black;">Journal of Computer Security</a> </i> &nbsp;
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary.  ...  We also show the generality of our approach by using it to quantify the information leaked by a security protocol.  ...  Second, the adversary must have sufficient computational resources to recover the key from this information.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2009-0397">doi:10.3233/jcs-2009-0397</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/okmmejr7jfhrzn2rnjw62uexou">fatcat:okmmejr7jfhrzn2rnjw62uexou</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110607105552/http://www.inf.ethz.ch/personal/basin/pubs/jcs10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/76/fc/76fcae4e56fcf3074d75253b50b79d2e73822895.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2009-0397"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Security analysis of a password-based authentication protocol proposed to IEEE 1363

Zhu Zhao, Zhongqi Dong, Yongge Wang
<span title="">2006</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/elaf5sq7lfdxfdejhkqbtz6qoq" style="color: black;">Theoretical Computer Science</a> </i> &nbsp;
These protocols aim to be secure even though the sample space of passwords may be small enough to be enumerated by an off-line adversary.  ...  In the ideal-cipher model, choosing a random function h from amounts to giving the protocol (and the adversary) a perfect way to encipher strings in G: namely, for K ∈ {0, 1} * , we set E K : G → C to  ...  The authors would also like to thank the anonymous referees of this journal for detailed comments on this paper. References  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.tcs.2005.11.038">doi:10.1016/j.tcs.2005.11.038</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yyrwytm6xvbvpg7ob37dtci24i">fatcat:yyrwytm6xvbvpg7ob37dtci24i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810011631/http://webpages.uncc.edu/yonwang/papers/TCSsrp5.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7e/33/7e333633a5d6e65299fb26eb4c081aa33f6d9f50.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.tcs.2005.11.038"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Guesswork and Variation Distance as Measures of Cipher Security [chapter]

John O. Pliam
<span title="">2000</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
As an example, we apply the technique to iterated cryptosystems, as the Markov property which results from an independent subkey assumption makes them particularly amenable to analysis.  ...  The machinery thus offers a new technique for establishing the security of a cipher: When the work-factor of the optimal known or chosen plaintext attack against a cipher is bounded below by a prohibitively  ...  Shannon's Model Secret keys and messages must be considered random from the viewpoint of a cryptanalytic adversary.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-46513-8_5">doi:10.1007/3-540-46513-8_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fdqkfakny5azpkdeyzuwtch4ru">fatcat:fdqkfakny5azpkdeyzuwtch4ru</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030102124/https://link.springer.com/content/pdf/10.1007%2F3-540-46513-8_5.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/62/1c/621c5e5eb8a4f66ff1cd0e1ca068aec19e52f3ee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-46513-8_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

ACTION: Breaking the Privacy Barrier for RFID Systems

L. Lu, J. Han, R. Xiao, Y. Liu
<span title="">2009</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2n2fyi4qgfa53mwrtarkk6ysnm" style="color: black;">IEEE INFOCOM 2009 - The 28th Conference on Computer Communications</a> </i> &nbsp;
The advantages of this design include: 1) resilience to the compromising attack, 2) reduction of key storage for tags from O(logN) to O(1), which is significant for resource critical tag devices, and 3  ...  To address this issue, we propose an Anti-Compromising authenticaTION protocol, ACTION, which employs a novel sparse tree architecture, such that the key of every tag is independent from one another.  ...  Repeating the enumeration, the adversary can retrieve the entire path key. To fix this flaw, we introduce a leaf key k i l in the path key updating procedure.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/infcom.2009.5062117">doi:10.1109/infcom.2009.5062117</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/infocom/LuHXL09.html">dblp:conf/infocom/LuHXL09</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ncqoull44ja3nctvcpv2wiul2y">fatcat:ncqoull44ja3nctvcpv2wiul2y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20090625190424/http://www.cse.ust.hk/~liu/luli/PID802563.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/34/71/34714edff847555d72264100fc6586a36281f60d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/infcom.2009.5062117"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Towards practical biometric key generation with randomized biometric templates

Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter
<span title="">2008</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 15th ACM conference on Computer and communications security - CCS &#39;08</a> </i> &nbsp;
Our analysis of this approach indicates that it may offer the potential to generate stronger keys: In our experiments, 40% of the users are able to generate keys that are at least 2 30 times stronger than  ...  In this paper, we exploit a novel source of entropy that can be used with any biometric modality but that has yet to be utilized for key generation, namely associating uncertainty with the way in which  ...  Acknowledgments We would like to thank Dan Lopresti for helpful discussions throughout the course of this work. We would also like to thank the anonymous reviewers for their comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1455770.1455801">doi:10.1145/1455770.1455801</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/BallardKMR08.html">dblp:conf/ccs/BallardKMR08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ondpmblvuzgz7hjgpgobjokoza">fatcat:ondpmblvuzgz7hjgpgobjokoza</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100607015657/http://www.cs.jhu.edu/~lucas/papers/rbts.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1c/7c/1c7c97e26173adf0331aef4e5974e8badd7ee94c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1455770.1455801"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Breaking Masked Implementations with Many Shares on 32-bit Software Platforms

Olivier Bronchain, François-Xavier Standaert
<span title="2021-07-09">2021</span> <i title="Universitatsbibliothek der Ruhr-Universitat Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yz7ssmvstjhsxiwixprnmyijnq" style="color: black;">Transactions on Cryptographic Hardware and Embedded Systems</a> </i> &nbsp;
Practically, we first exhibit a full 128-bit key recovery in less than 10 traces for a 6-share masked AES implementation running on the Cortex-M0 requiring 232 enumeration power.  ...  A similar attack performed against the Cortex-M3 with 5 shares require 1,000 measurements with 244 enumeration power.  ...  François-Xavier Standaert is senior research associate of the Belgian Fund for Scientific Research (F.R.S.-FNRS). This work has been funded by the EU through the ERC project SWORD (724725).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tches.v2021.i3.202-234">doi:10.46586/tches.v2021.i3.202-234</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mjccfpanhrfunfkccivkq2ojvi">fatcat:mjccfpanhrfunfkccivkq2ojvi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210713113356/https://tches.iacr.org/index.php/TCHES/article/download/8973/8551" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bd/43/bd433d167bfaf98020dbaa6514dfa5959d873400.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.46586/tches.v2021.i3.202-234"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Security Analysis of a Password-Based Authentication Protocol Proposed to IEEE 1363 [article]

Z. Zhao, Z. Dongand Yongge Wang
<span title="2012-07-23">2012</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
These protocols aim to be secure even though the sample space of passwords may be small enough to be enumerated by an off-line adversary.  ...  They claimed that in the ideal-cipher model (random oracles), the two-flow protocol at the core of Encrypted Key Exchange (EKE) is secure.  ...  The authors would also like to thank the anonymous referees of this journal for detailed comments on this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1207.5442v1">arXiv:1207.5442v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vzecjhjabjbj7eeurrjg4vl4me">fatcat:vzecjhjabjbj7eeurrjg4vl4me</a> </span>
<a target="_blank" rel="noopener" href="https://archive.org/download/arxiv-1207.5442/1207.5442.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> File Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1207.5442v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Semantic Part Detection via Matching: Learning to Generalize to Novel Viewpoints from Limited Training Data [article]

Yutong Bai, Qing Liu, Lingxi Xie, Weichao Qiu, Yan Zheng, Alan Yuille
<span title="2019-09-13">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
parts from a much larger range of viewpoints.  ...  In this paper we present an approach which learns from a small training dataset of annotated semantic parts, where the object is seen from a limited range of viewpoints, but generalizes to detect semantic  ...  [58] and adversarial attacks [54] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1811.11823v4">arXiv:1811.11823v4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vkgwiilsavh57eqlhrcy45afha">fatcat:vkgwiilsavh57eqlhrcy45afha</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200826020429/https://arxiv.org/pdf/1811.11823v4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7b/a3/7ba30747a576e11ed60a52b198729433afe3dd72.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1811.11823v4" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Indistinguishable Executable Code Generation Method

Mikhail Styugin
<span title="2016-08-31">2016</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4h7flaxsjnh6he3qbiwvxbekxe" style="color: black;">International Journal of Security and Its Applications</a> </i> &nbsp;
This paper considers the idea of obfuscation from another viewpoint and demonstrates that an indistinguishability requirement for it can be formulated and proved.  ...  In this case, an obfuscator is provided with a key at the input. It is nearly impossible to discover the program's functionality without having the key.  ...  Since direct analysis of the obfuscated program's code does not provide information about the algorithms it can execute, hence, it does not need protection from analysis by a potential adversary.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.8.27">doi:10.14257/ijsia.2016.10.8.27</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qniwbjhgnvemvevpwii7cu4fam">fatcat:qniwbjhgnvemvevpwii7cu4fam</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604124933/http://www.sersc.org/journals/IJSIA/vol10_no8_2016/27.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/75/33/75334ffc056f2758539ad57f91e3c943757b5512.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.8.27"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Software issues in digital forensics

J. Todd McDonald, Yong C. Kim, Alec Yasinsac
<span title="2008-04-01">2008</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/i24hgue5erh4haqtfyyjvfijdu" style="color: black;">ACM SIGOPS Operating Systems Review</a> </i> &nbsp;
In either case, law enforcement needs the ability (when required) to collect evidence from such platforms in a reliable manner that preserves the fingerprints of criminal activity.  ...  Criminals can use computers as the actual target of their malicious activity (stealing funds electronically from a bank) or use them to support the conduct of criminal activity in general (using a spreadsheet  ...  However, it may be useful from a theoretic viewpoint to measure or understand how much information leaks from source code if only static (structural) analysis is allowed.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368506.1368512">doi:10.1145/1368506.1368512</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/46ogvv3qszg25dc2bvwsc7wah4">fatcat:46ogvv3qszg25dc2bvwsc7wah4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170705090822/http://soc.southalabama.edu/%7Emcdonald/pubs/ACM-SIGOPS-2008-SoftwareIssuesDigitalForensics-TurnIn.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a9/88/a9881254104c5500783c19ca677318469a7e6ada.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1368506.1368512"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 3,163 results