Filters








16 Hits in 5.6 sec

Practical Evaluation of FSE 2016 Customized Encoding Countermeasure

Shivam Bhasin, Dirmanto Jap, Thomas Peyrin
2017 IACR Transactions on Symmetric Cryptology  
To protect against side-channel attacks, many countermeasures have been proposed. A novel customized encoding countermeasure was published in FSE 2016.  ...  In this paper, we implement a full block cipher with customized encoding countermeasure and investigate its security under simulated and practical setting for a general purpose microcontroller.  ...  Introduction to Customized Encoding At FSE 2016, Maghrebi et al. [MSB16] proposed a customized encoding countermeasure built according to the precise leakage model based on a stochastic profiling.  ... 
doi:10.46586/tosc.v2017.i3.108-129 fatcat:ump3sjhftffgrjqo3q634mhk2e

Practical Evaluation of FSE 2016 Customized Encoding Countermeasure

Shivam Bhasin, Dirmanto Jap, Thomas Peyrin
2017 IACR Transactions on Symmetric Cryptology  
To protect against side-channel attacks, many countermeasures have been proposed. A novel customized encoding countermeasure was published in FSE 2016.  ...  In this paper, we implement a full block cipher with customized encoding countermeasure and investigate its security under simulated and practical setting for a general purpose microcontroller.  ...  Introduction to Customized Encoding At FSE 2016, Maghrebi et al. [MSB16] proposed a customized encoding countermeasure built according to the precise leakage model based on a stochastic profiling.  ... 
doi:10.13154/tosc.v2017.i3.108-129 dblp:journals/tosc/BhasinJP17 fatcat:iub2mgujhjerhmelvqrajy3ami

There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks [chapter]

Houssem Maghrebi, Victor Servant, Julien Bringer
2016 Lecture Notes in Computer Science  
To counteract it, a recent line of research has investigated the use of software encoding functions such as dual-rail rather than the well known masking countermeasure.  ...  A concrete experimentation of our proposal to protect the PRESENT Sbox confirms its practicability.  ...  We thank anonymous reviewers of FSE 2016 for the various constructive comments and suggestions.  ... 
doi:10.1007/978-3-662-52993-5_12 fatcat:zc3ojhwtezhgpnawj3frlxiaji

O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification

Mohsen Kakavand, Aida Mustapha, Zhiyuan Tan, Sepideh Foroozana, Lingges Arulsamy
2019 IEEE Access  
The O-ADPI model was assessed for F-value, true positive rate (TPR), and false positive rate (FPR) in order to evaluate the detectionx performance of O-ADPI against different type of feature selections  ...  Selection Engine (FSE) to effectively and efficiently explore optimal subspaces in detecting anomalies embedded deep in the high dimensional feature subspaces.  ...  At present, there is inadequate evaluation to countermeasure on REST payload attacks.  ... 
doi:10.1109/access.2019.2953791 fatcat:aaxqzvcsongyveuemaqc65fbsa

A Survey on Future Internet Security Architectures

Wenxiu Ding, Zheng Yan, Robert H. Deng
2016 IEEE Access  
In order to obtain a thorough knowledge of security in future Internet architecture, we review a number of well-known projects, including named data networking, Content Aware Searching Retrieval and sTreaming  ...  Current host-centric Internet Protocol (IP) networks are facing unprecedented challenges, such as network attacks and the exhaustion of IP addresses.  ...  VOLUME 4, 2016 2) PRIVACY With the rapid development of data mining, privacy has become one of the most important factors to evaluate a new architecture.  ... 
doi:10.1109/access.2016.2596705 fatcat:ny3dd4naaref7ktsmu32xzosbe

Testing machine learning based systems: a systematic mapping

Vincenzo Riccio, Gunel Jahangirova, Andrea Stocco, Nargiz Humbatova, Michael Weiss, Paolo Tonella
2020 Empirical Software Engineering  
3) their empirical evaluation.  ...  MLS testing is a rapidly growing and developing research area, with many open challenges, such as the generation of realistic inputs and the definition of reliable evaluation metrics and benchmarks.  ...  To view a copy of this licence, visit http://creativecommonshorg/licenses/by/4.0/.  ... 
doi:10.1007/s10664-020-09881-0 fatcat:7w42stnm3nfafia7ycbmvhrjou

Bitcoin's APIs in Open-Source Projects: Security Usability Evaluation

Philipp Tschannen, Ali Ahmed
2020 Electronics  
Furthermore, it evaluates the API usability of Libbitcoin, a well-known C++ implementation of the Bitcoin system, and assesses how the findings of this evaluation could affect the applications that use  ...  Insecure coding practices, the complexity of the task in hand, and usability issues, amongst other reasons, make it hard on software developers to maintain secure code.  ...  (2016) in [32] , there did not exist any research on the usability of Bitcoin from a developer's perspective by 2016, although the unfriendly nature of Bitcoin's API has been noted by Meva (2016)  ... 
doi:10.3390/electronics9071077 fatcat:7dgaze5pwjhrvp3nrinwc2vvbq

Research on Third-Party Libraries in AndroidApps: A Taxonomy and Systematic LiteratureReview [article]

Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, Yang Liu
2021 arXiv   pre-print
On the one hand, it can ease the development of mobile apps.  ...  of new research directions related to third-party library analysis.  ...  [78] 2016 NDSS LibCage [79] 2016 ESORICS LibFinder [80] 2016 S&P LibRadar [41] 2016 ICSE-C LibScout [23] 2016 CCS LibSift [81] 2016 APSEC Pluto [9] 2016 NDSS Li et al.  ... 
arXiv:2108.03787v1 fatcat:jnj4kvlkuzg3hbgy4pl5wpvle4

WebRanz: web page randomization for better advertisement delivery and web-bot prevention

Weihang Wang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, Patrick Eugster
2016 Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2016  
We evaluate the effectiveness of We-bRanz and its overhead using 221 randomly sampled top Alexa web pages and 8 representative bot scripts.  ...  Despite these benefits to end users, Ad-blockers could be catastrophic for the economic structure underlying the web, especially considering the rise of Ad-blocking as well as the number of technologies  ...  EVALUATION In this section, we describe our implementation and evaluate the effectiveness and efficiency of WebRanz in preventing ad-blocking and web bots.  ... 
doi:10.1145/2950290.2950352 dblp:conf/sigsoft/WangZXKZE16 fatcat:lmkkipjdgzctrmjz6f4enozpwe

Stable isotope ratios of H, C, O, N and S for the geographical traceability of Italian rainbow trout ( Oncorhynchus mykiss )

Federica Camin, Matteo Perini, Luana Bontempo, Marco Galeotti, Emilio Tibaldi, Edi Piasentier
2018 Food Chemistry  
Acknowledgments: The author would like to acknowledge the 20 workpackage leaders and the large number of scientists that contribute to FoodIntegrity from the 60 organisations that participate in the project  ...  Currently the two most used countermeasures are visual inspection by experts and DNA analysis.  ...  This new assay is currenly offered to the customer worldwide.  ... 
doi:10.1016/j.foodchem.2017.06.017 pmid:29934170 fatcat:w3a4tqbjm5civnjxs2ax2vlsye

Supporting automated containment checking of software behavioural models

Muram Faiz Ul
2017 unpublished
The major contributions of this dissertation are novel concepts and techniques for automatic containment checking of software behaviour models.  ...  However, the feedback of model checkers is rather not helpful for users with limited background on the underlying formal methods to analyse and understand the causes of consistency violations.  ...  Lack of Rigorous Studies, Evaluation, and Practical Impacts Lack of rigorous studies, evaluation, and practical impacts reflect the quality of studies being conducted in the literature of software behavioural  ... 
doi:10.25365/thesis.47558 fatcat:pqjxp26psfgzlhll6fqybwzp3a

Principle-Driven Continuous Integration: Simplifying Failure Discovery and Raising Anti-Pattern Awareness

Carmine Vassallo
2020
The reason is that living up to the recommended practices (called principles) of CI is not easy and developers tend to follow anti-patterns, which are ineffective solutions to recurrent problems.  ...  We start with classifying the anti-patterns encountered by developers in practice and identifying their four root causes, which are (i) the poor knowledge of the prerequisites for adopting CI, (ii) the  ...  Acknowledgements authors independently validated the resulting sample of 868 issues.  ... 
doi:10.5167/uzh-197036 fatcat:4xwxho5vtnfezel6hogpmcq2li

Dagstuhl Reports, Volume 8, Issue 1, January 2018, Complete Issue [article]

2018
Seven emergent topics have been identified ranging from the nature of the GI search space through benchmarking and practical applications.  ...  Abstract We document the program and the immediate outcomes of Dagstuhl Seminar 18052 "Genetic Improvement of Software".  ...  is encoded adversarially.  ... 
doi:10.4230/dagrep.8.1 fatcat:dv5ntjliznbs7dwohrcmiwr3lm

Proceedings of the 2021 Joint Workshop of the German Research Training Groups in Computer Science. May 31–June 1, 2021

Joint Workshop Of The German Research Training Groups In Computer Science, Erlangen May 31–June 1, 2021, Felix Freiling
2021
The goal of these workshops is to foster an interchange of ideas and experiences in order to strengthen the connection within the German computer science community.  ...  Initiated in 1996 and run regularly since 2007, researchers of the German Research and Training Groups (RTGs) funded by the Deutsche Forschungsgemeinschaft (DFG) in the field of computer science meet annually  ...  FSE 2016, p. 326--337, 2016 3 https://github.com/sosy-lab/sv-witnesses/issues/17 D. Ron and A. Shamir. Quantitative analysis of the full Bitcoin transaction graph. In FC 2013, pages 6-24, 2013.  ... 
doi:10.25593/opus4-fau-16426 fatcat:isoyq5lzdffxrdqzvkmfsnjgau

Adaptation Timing in Self-Adaptive Systems

Gabriel A. Moreno
2018
of an order of magni [...]  ...  of the near future state of the environment to adapt proactively; (ii) considering the latency of adaptation tactics when deciding how to adapt; and (iii) executing tactics concurrently.  ...  January 2016 [23] .  ... 
doi:10.1184/r1/6714578 fatcat:bv5qjkfinffwdnfjyodd3zgk7i
« Previous Showing results 1 — 15 out of 16 results