Filters








4,455 Hits in 4.2 sec

On Attacks on Filtering Generators Using Linear Subspace Structures [chapter]

Sondre Rønjom, Guang Gong, Tor Helleseth
Lecture Notes in Computer Science  
This paper gives an alternative and extended attack to reconstruct the initial state of the LFSR using the underlying subspace structure of the filter sequence.  ...  A new attack on the filter generator has recently been described by Rønjom and Helleseth [6].  ...  Since this paper only needs the linear subspace structure of the filter generator, the results can be directly extended to a combination generator as well. Notations and Preliminaries A.  ... 
doi:10.1007/978-3-540-77404-4_20 dblp:conf/ssc/RonjomGH07 fatcat:zmoalbs3fvclbhwmjfmu6ul4wa

Distributed cyber attack detection for power network systems

Hideaki Hashimoto, Tomohisa Hayakawa
2011 IEEE Conference on Decision and Control and European Control Conference  
The approach is based on fault detection and identification (FDI) filter so that malicious cyber attacks in the neighborhood of a node are identified through local information that consists of local power  ...  equation and cyber attacks are modeled as unknown power generation or consumption.  ...  When U is a subspace of the linear space X and V is a subspace of the linear space Y, respectively, the image and the inverse image of the subspaces associated with A is defined as AU {Ax : x ∈ U}, (1)  ... 
doi:10.1109/cdc.2011.6161536 dblp:conf/cdc/HashimotoH11 fatcat:m62bxmcatjdl3eav2rzpfynmfq

Searching for Subspace Trails and Truncated Differentials

Gregor Leander, Cihangir Tezcan, Friedrich Wiemer
2018 IACR Transactions on Symmetric Cryptology  
While it is a generic method, up to now it was only applied to the Aes and Prince. One problem for a broad adoption of the attack is a missing generic analysis algorithm.  ...  [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subspaces and used it to give the first five round distinguisher for Aes.  ...  Acknowledgments The experimental results were partially computed on the Ruhr-University's "Crypto Crunching Cluster" (C3). This work was supported by the German Research Foundation through  ... 
doi:10.13154/tosc.v2018.i1.74-100 dblp:journals/tosc/LeanderTW18 fatcat:gbll3w6xefbyvppl3eyvfd2beq

GraCIAS: Grassmannian of Corrupted Images for Adversarial Security [article]

Ankita Shukla, Pavan Turaga, Saket Anand
2020 arXiv   pre-print
Input transformation based defense strategies fall short in defending against strong adversarial attacks.  ...  In this work, we propose a defense strategy that applies random image corruptions to the input image alone, constructs a self-correlation based subspace followed by a projection operation to suppress the  ...  Due to a principled structure of generated image corruptions used for defining the subspace, it permits projection and reconstruction of the input image without substantial loss of information.  ... 
arXiv:2005.02936v2 fatcat:2ofcn2r23bavtcin2xsxkzphey

Cyber-physical security via geometric control: Distributed monitoring and malicious attacks

Fabio Pasqualetti, Florian Dorfler, Francesco Bullo
2012 2012 IEEE 51st IEEE Conference on Decision and Control (CDC)  
Finally, we design an attack strategy for a group of power generators to physically compromise the functionality of other generators.  ...  This paper summarizes and extends our results on the security of cyber-physical systems based on geometric control theory: (i) we propose a mathematical framework for cyberphysical systems, attacks, and  ...  We borrow some tools from the theory of structured systems, and we identify conditions on the system interconnection structure for the existence of undetectable attacks.  ... 
doi:10.1109/cdc.2012.6426257 dblp:conf/cdc/PasqualettiDB12 fatcat:mvd55kdnbbgbdkwkpsu3fkeoim

On the Multi-output Filtering Model and Its Applications [chapter]

Teng Wu, Yin Tan, Kalikinkar Mandal, Guang Gong
2017 Lecture Notes in Computer Science  
First, we propose an attack technique under IND-CPA using the multi-output filtering model. By introducing a distinguishing function, we theoretically determine the success rate of this attack.  ...  We demonstrate that the success rate of the attack on KASUMI and PRESENT is non-negligible, but f1 and AES are resistant to this attack.  ...  The LFSR is used to generate an input subspace of C and C is used as a multi-output filtering function.  ... 
doi:10.1007/978-3-319-55589-8_18 fatcat:gakaae3glfbjhiynudsxgafm5e

Page 796 of Journal of Aircraft Vol. 25, Issue 9 [page]

1988 Journal of Aircraft  
An extended Kalman- Bucy filter (EKF) and a modified Bryson-Frazier smoother are used for this purpose.  ...  Introduction HE aerodynamic forces and moments acting on an aircraft at high angles of attack and sideslip are strongly nonlinear with respect to the aircraft state and control variables.  ... 

Searching for Subspace Trails and Truncated Differentials

Gregor Leander, Cihangir Tezcan, Friedrich Wiemer
2018 IACR Transactions on Symmetric Cryptology  
While it is a generic method, up to now it was only applied to the Aes and Prince. One problem for a broad adoption of the attack is a missing generic analysis algorithm.  ...  [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subspaces and used it to give the first five round distinguisher for Aes.  ...  Acknowledgments The experimental results were partially computed on the Ruhr-University's "Crypto Crunching Cluster" (C3). This work was supported by the German Research Foundation through  ... 
doi:10.46586/tosc.v2018.i1.74-100 fatcat:kc3heejw3jci5k2s4nhya5kd7m

Interpretable Convolutional Neural Networks via Feedforward Design [article]

C.-C. Jay Kuo, Min Zhang, Siyang Li, Jiali Duan, Yueru Chen
2018 arXiv   pre-print
As to fully-connected (FC) layers, we construct them using a cascade of multi-stage linear least squared regressors (LSRs).  ...  It derives network parameters of the current layer based on data statistics from the output of the previous layer in a one-pass manner.  ...  Acknowledgment This material is partially based on research sponsored by DARPA and Air Force Research Laboratory (AFRL) under agreement number FA8750-16-2-0173. The U.S.  ... 
arXiv:1810.02786v2 fatcat:fs34uzznwfdfvllmuiqcqe2gei

Distributed Detection of Cyber Attacks and Faults for Power Systems

Hiroaki Nishino, Hideaki Ishii
2014 IFAC Proceedings Volumes  
The scheme is distributed in the sense that it uses only locally available data such as the generated power, loads, and power flows.  ...  The approach is based on grouping of buses in the system, and for each group, we design filters for detection and isolation of faults applied to the buses within the group.  ...  Though this filter alone is not able to detect attacks on one bus, we propose a method that identifies the attacked buses by (i) designing the above filter for all pairs i, j ∈Ṽ, i = j), and then (ii)  ... 
doi:10.3182/20140824-6-za-1003.02425 fatcat:67om66zocfflhjqx6lh7l4436q

Practical watermarking scheme based on wide spread spectrum and game theory

Stéphane Pateux, Gaëtan Le Guelvouit
2003 Signal processing. Image communication  
We consider this problem as a communication problem and formulated it as a game between an attacker and an embedder in order to establish its theoretical performance.  ...  Gaussian signals and distortion based on perceptual metrics.  ...  a linear subspace embedding technique.  ... 
doi:10.1016/s0923-5965(02)00145-5 fatcat:6xfy53ve7jbv7n7hpbctf57mke

Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition [article]

Jenn-Bing Ong, Wee-Keong Ng, C.-C. Jay Kuo
2018 arXiv   pre-print
Furthermore, we propose a theory for adversarial examples that mislead convolutional neural networks to misclassification using subspace analysis based on singular value decomposition (SVD).  ...  The theory is extended to analyze higher-order tensors using tensor-train SVD (TT-SVD); it helps to explain the level of susceptibility of different datasets to adversarial attacks, the structural similarity  ...  Existing theories on adversarial examples such as models' linearity and non-linearity hypotheses, dimensional analyses, etc. do not generalize to different adversarial attacks, these theories typically  ... 
arXiv:1812.02622v2 fatcat:dkdjfsanlbbqlkbh5two34sebm

Cryptanalysis of SP Networks with Partial Non-Linear Layers [chapter]

Achiya Bar-On, Itai Dinur, Orr Dunkelman, Virginie Lallemand, Nathan Keller, Boaz Tsaban
2015 Lecture Notes in Computer Science  
We first apply our techniques to the block cipher Zorro (designed by Gérard et al. following their methodology), obtaining practical attacks on the cipher which where fully simulated on a single desktop  ...  In this paper we present generic techniques for differential and linear cryptanalysis of SP networks with partial non-linear layers, including an automated characteristic search tool and dedicated key-recovery  ...  The optimization can be particularly useful when the filtered linear subspace is of a relatively large dimension (and thus, we have less restrictions on the choice of free variables).  ... 
doi:10.1007/978-3-662-46800-5_13 fatcat:bkacq6zt2jckzfy5obgdc2iep4

A Block Cipher Cryptosystem Using Wavelet Transforms Over Finite Fields

K.S. Chan, F. Fekri, K.S. Chan, F. Fekri
2004 IEEE Transactions on Signal Processing  
By considering existing classical and structure-specific attacks, we conclude that the lowest complexity of any of these attacks is greater than an exhaustive key search.  ...  The introduced cryptographic system can operate in either stream-cipher or block-cipher modes depending on whether the filterbanks perform linear or circular convolution.  ...  Divide and Conquer Linear Attack on the One-Round Wavelet Cryptosystem This section presents chosen ciphertext attacks on the wavelet algorithm.  ... 
doi:10.1109/tsp.2004.833864 fatcat:kifiunj6fjaqvbbj4po6i4qpum

Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 [chapter]

Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir
2015 Lecture Notes in Computer Science  
Our basic technique is called a linear key sieve since it exploits as filtering conditions linear dependencies between key bits that are guessed from both sides of the attack.  ...  As our first two single-key attacks, the related-key attack is also based on the linear key sieve, but it uses additional techniques in differential meet-inthe-middle which are interesting in their own  ...  The Improved Chosen Plaintext Single-Key Attack on 2- Step LED-64 Our attack on 2- Step LED-64 follows the same general structure as the previous one of [10, 13] .  ... 
doi:10.1007/978-3-662-46706-0_20 fatcat:6khi7qj5svgn5gxkbe6q3u4v2y
« Previous Showing results 1 — 15 out of 4,455 results