Filters








88,608 Hits in 6.2 sec

Protect Sensitive Information against Channel State Information Based Attacks

Jie Zhang, Zhanyong Tang, Rong Li, Xiaojiang Chen, XiaoQing Gong, Dingyi Fang, Zheng Wang
2017 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)  
Channel state information (CSI) has been recently shown to be useful in performing security attacks in public WiFi environments.  ...  This paper presents WiGuard, a novel system to protect sensitive on-screen gestures in a public place.  ...  This paper presents WiGuard, a system to protect sensitive on-screen gestures against CSI-based attacks.  ... 
doi:10.1109/cse-euc.2017.221 dblp:conf/cse/ZhangTLCGFW17 fatcat:uojbltgydfekfguzicizbpy2qu

Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures

Chao Su, Qingkai Zeng, Petros Nicopolitidis
2021 Security and Communication Networks  
Privacy protection is an essential part of information security. The use of shared resources demands more privacy and security protection, especially in cloud computing environments.  ...  Information is leaked through channels that are not intended to transmit information, jeopardizing system security. These attacks have the characteristics of both high concealment and high risk.  ...  sensitive information and the cache state so that cache side-channel attacks cannot leak corresponding information through cache.  ... 
doi:10.1155/2021/5559552 fatcat:3lyiwmpkircy3moygfzayrupjy

Robust and Efficient Elimination of Cache and Timing Side Channels [article]

Benjamin A. Braun and Suman Jana and Dan Boneh
2015 arXiv   pre-print
Timing and cache side channels provide powerful attacks against many sensitive operations including cryptographic implementations.  ...  Existing defenses cannot protect against all classes of such attacks without incurring prohibitive performance overhead.  ...  We also expect that the underlying principles of our solution will be useful in future work protecting against other forms of side channel attacks.  ... 
arXiv:1506.00189v2 fatcat:qaht7ybtrvbb3itldovs56jkii

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard
2018 IEEE Communications Surveys and Tutorials  
Given the vast amount of sensitive information that are stored on smartphones, the ramifications of side-channel attacks affect both the security and privacy of users and their devices.  ...  application is all it takes to exploit the leaking information on modern mobile devices.  ...  More specifically, side-channel attacks against smart cards have been conducted to reveal sensitive information that should be protected from being accessed by benign users.  ... 
doi:10.1109/comst.2017.2779824 fatcat:4r5ceyc7pbdfxdmngtdncv4n5m

Agent-based Channel Selection scheme against location inference attack in cognitive radio networks

Hongning Li, Qingqi Pei, Yao Liu
2015 MILCOM 2015 - 2015 IEEE Military Communications Conference  
To prevent location inference attack, we propose an Agent-based Channel Selection(ACS) scheme in this paper.  ...  In this scheme, the database allocates spectrum with self-coexistence mechanism to avoid interference, and each base station registers spectrum information as an agent in the database instead of secondary  ...  Attackers can infer the SU based on the change of the channel state or the switch of the SU.  ... 
doi:10.1109/milcom.2015.7357566 dblp:conf/milcom/LiPL15 fatcat:m7vmnlgrknhyxe66nbxmkspwdy

MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation [article]

Zhen Hang Jiang, Yunsi Fei, Aidong Adam Ding, Thomas Wahl
2020 IACR Cryptology ePrint Archive  
We generalize these attacks as memory-based side-channel attacks. In this paper, we propose a novel software countermeasure, MemPoline, against memory-based side-channel attacks.  ...  Both empirical results and theoretical analysis show that our countermeasure resists a series of existing memory-based side-channel attacks on CPUs and GPUs.  ...  against memory-based side-channel attacks.  ... 
dblp:journals/iacr/JiangFDW20 fatcat:q2s3w2p5hrbsfinhpheiufpy4e

Automatic Application of Power Analysis Countermeasures

Ali Galip Bayrak, Francesco Regazzoni, David Novo, Philip Brisk, Francois-Xavier Standaert, Paolo Ienne
2015 IEEE transactions on computers  
We introduce a compiler that automatically inserts software countermeasures to protect cryptographic algorithms against power-based side-channel attacks.  ...  Our compiler offers significant productivity gains for cryptosystem developers who wish to protect their implementations from side-channel attacks.  ...  As in Fig. 7 , higher sensitivity means higher vulnerability against side-channel attacks.  ... 
doi:10.1109/tc.2013.219 fatcat:l2tviwta5ndzhk3oftmkv3jevy

Data Hiding and Its Applications: Digital Watermarking and Steganography

David Megías, Wojciech Mazurczyk, Minoru Kuribayashi
2021 Applied Sciences  
The effectiveness of the method against screen-cam attacks is shown and the scheme outperforms the state-of-the-art techniques not only against screen-cam attacks, but also when they are combined with  ...  against network covert channels and stegomalware.  ... 
doi:10.3390/app112210928 fatcat:fs2amctwc5fkhaaiyf2oq66zfq

Cyber Stealth Attacks in Critical Information Infrastructures

Lorena Cazorla, Cristina Alcaraz, Javier Lopez
2018 IEEE Systems Journal  
an overview of the applicable countermeasures against these attacks.  ...  This paper contains a comprehensive study on the main stealth attacks that threaten CIs, with a special focus on Critical Information Infrastructures (CIIs).  ...  of sensitivity, thus special security mechanisms can be put into place to differing degrees to protect the data according to its sensitivity. • Secure protocols: to protect the systems against covert  ... 
doi:10.1109/jsyst.2015.2487684 fatcat:6kebjfw5zjcirgquxsi5n7gfte

Scriptless attacks

Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
Through several case studies, we introduce the so called scriptless attacks and demonstrate that an adversary might not need to execute code to preserve his ability to extract sensitive information from  ...  well protected websites.  ...  As a further contribution, we propose new protection mechanisms against this new class of attacks.  ... 
doi:10.1145/2382196.2382276 dblp:conf/ccs/HeiderichNSHS12 fatcat:qf27r473mvdtxakegcujj6w6cm

Fault-based attacks on cryptographic hardware

I. Polian, M. Kreuzer
2013 2013 IEEE 16th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)  
In the recent years, a large number of fault-based attacks and countermeasures to protect cryptographic circuits against them have been developed.  ...  By doing so, the attacker obtains supplementary information that she can utilize during cryptanalysis to derive protected data, such as secret keys.  ...  COUNTERMEASURES AND DESIGN CONSIDERATIONS Protection against fault-based attacks can work on multiple abstraction levels: technology, circuit, information, or application.  ... 
doi:10.1109/ddecs.2013.6549781 dblp:conf/ddecs/PolianK13 fatcat:463ms2z3draxdkuox4i72ib7fi

Data exfiltration: A review of external attack vectors and countermeasures

Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar, Awais Rashid
2018 Journal of Network and Computer Applications  
Context: One of the main targets of cyber-attacks is data exfiltration, which is the leakage of sensitive or private data to an unauthorized entity.  ...  These countermeasures aim to detect, prevent, or investigate exfiltration of sensitive or private data.  ...  Category Paper Data state Contribution Provide Protection against Data Classification Liu et al. [39] In use Leverages hardware-based virtualization to separate sensitive data from non-sensitive  ... 
doi:10.1016/j.jnca.2017.10.016 fatcat:fweg67tparct5owb3r4qrpgvxq

DISCO: Dynamic and Invariant Sensitive Channel Obfuscation for deep neural networks [article]

Abhishek Singh, Ayush Chopra, Vivek Sharma, Ethan Garza, Emily Zhang, Praneeth Vepakomma, Ramesh Raskar
2021 arXiv   pre-print
We propose diverse attack schemes for sensitive inputs \& attributes and demonstrate the effectiveness of DISCO against state-of-the-art methods through quantitative and qualitative evaluation.  ...  We posit that selectively removing features in this latent space can protect the sensitive information and provide a better privacy-utility trade-off.  ...  Baselines For attacks on sensitive attributes, we baseline with ARL based methods [29, 24, 23] which are state-ofthe-art on attribute leakage.  ... 
arXiv:2012.11025v2 fatcat:dqg6gkx7mvh7dka3sqdcufcwd4

Survey on Cache-Based Side-Channel Attacks in Cloud Computing

Hesham Abusaimeh
2020 International Journal of Emerging Trends in Engineering Research  
that can be implemented to reduce the Cache based side-channel attacks.  ...  Cache based side-channel attacks are powerful, agile and more suitable to be executed in a cloud environment rather than in traditional networks because of cloud computing architecture.  ...  based side-channel attacks Table 1 : 1 List of approaches to prevent Cache Side Channel attack environment and running them against the attacks to Approach Technique Result evaluated defense against built  ... 
doi:10.30534/ijeter/2020/11842020 fatcat:spnlmp74urcyferi4hsxk4epxm

In Hardware We Trust

Lejla Batina, Patrick Jauernig, Nele Mentens, Ahmad-Reza Sadeghi, Emmanuel Stapf
2019 Proceedings of the 56th Annual Design Automation Conference 2019 on - DAC '19  
If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons.  ...  A promising approach is to manage hardware by a small software Trusted Computing Base (TCB) to create TEEs, e.g., protecting sensitive user-space code on mobile devices based on ARM TrustZone [7] , or  ...  Fault attacks aim at exposing sensitive information triggered by irregular conditions that lead to faulty computations.  ... 
doi:10.1145/3316781.3323480 dblp:conf/dac/BatinaJMSS19 fatcat:kuppngfcgrh4vngiln2ho5dwtq
« Previous Showing results 1 — 15 out of 88,608 results