A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Protect Sensitive Information against Channel State Information Based Attacks
2017
22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
Channel state information (CSI) has been recently shown to be useful in performing security attacks in public WiFi environments. ...
This paper presents WiGuard, a novel system to protect sensitive on-screen gestures in a public place. ...
This paper presents WiGuard, a system to protect sensitive on-screen gestures against CSI-based attacks. ...
doi:10.1109/cse-euc.2017.221
dblp:conf/cse/ZhangTLCGFW17
fatcat:uojbltgydfekfguzicizbpy2qu
Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures
2021
Security and Communication Networks
Privacy protection is an essential part of information security. The use of shared resources demands more privacy and security protection, especially in cloud computing environments. ...
Information is leaked through channels that are not intended to transmit information, jeopardizing system security. These attacks have the characteristics of both high concealment and high risk. ...
sensitive information and the cache state so that cache side-channel attacks cannot leak corresponding information through cache. ...
doi:10.1155/2021/5559552
fatcat:3lyiwmpkircy3moygfzayrupjy
Robust and Efficient Elimination of Cache and Timing Side Channels
[article]
2015
arXiv
pre-print
Timing and cache side channels provide powerful attacks against many sensitive operations including cryptographic implementations. ...
Existing defenses cannot protect against all classes of such attacks without incurring prohibitive performance overhead. ...
We also expect that the underlying principles of our solution will be useful in future work protecting against other forms of side channel attacks. ...
arXiv:1506.00189v2
fatcat:qaht7ybtrvbb3itldovs56jkii
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
2018
IEEE Communications Surveys and Tutorials
Given the vast amount of sensitive information that are stored on smartphones, the ramifications of side-channel attacks affect both the security and privacy of users and their devices. ...
application is all it takes to exploit the leaking information on modern mobile devices. ...
More specifically, side-channel attacks against smart cards have been conducted to reveal sensitive information that should be protected from being accessed by benign users. ...
doi:10.1109/comst.2017.2779824
fatcat:4r5ceyc7pbdfxdmngtdncv4n5m
Agent-based Channel Selection scheme against location inference attack in cognitive radio networks
2015
MILCOM 2015 - 2015 IEEE Military Communications Conference
To prevent location inference attack, we propose an Agent-based Channel Selection(ACS) scheme in this paper. ...
In this scheme, the database allocates spectrum with self-coexistence mechanism to avoid interference, and each base station registers spectrum information as an agent in the database instead of secondary ...
Attackers can infer the SU based on the change of the channel state or the switch of the SU. ...
doi:10.1109/milcom.2015.7357566
dblp:conf/milcom/LiPL15
fatcat:m7vmnlgrknhyxe66nbxmkspwdy
MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation
[article]
2020
IACR Cryptology ePrint Archive
We generalize these attacks as memory-based side-channel attacks. In this paper, we propose a novel software countermeasure, MemPoline, against memory-based side-channel attacks. ...
Both empirical results and theoretical analysis show that our countermeasure resists a series of existing memory-based side-channel attacks on CPUs and GPUs. ...
against memory-based side-channel attacks. ...
dblp:journals/iacr/JiangFDW20
fatcat:q2s3w2p5hrbsfinhpheiufpy4e
Automatic Application of Power Analysis Countermeasures
2015
IEEE transactions on computers
We introduce a compiler that automatically inserts software countermeasures to protect cryptographic algorithms against power-based side-channel attacks. ...
Our compiler offers significant productivity gains for cryptosystem developers who wish to protect their implementations from side-channel attacks. ...
As in Fig. 7 , higher sensitivity means higher vulnerability against side-channel attacks. ...
doi:10.1109/tc.2013.219
fatcat:l2tviwta5ndzhk3oftmkv3jevy
Data Hiding and Its Applications: Digital Watermarking and Steganography
2021
Applied Sciences
The effectiveness of the method against screen-cam attacks is shown and the scheme outperforms the state-of-the-art techniques not only against screen-cam attacks, but also when they are combined with ...
against network covert channels and stegomalware. ...
doi:10.3390/app112210928
fatcat:fs2amctwc5fkhaaiyf2oq66zfq
Cyber Stealth Attacks in Critical Information Infrastructures
2018
IEEE Systems Journal
an overview of the applicable countermeasures against these attacks. ...
This paper contains a comprehensive study on the main stealth attacks that threaten CIs, with a special focus on Critical Information Infrastructures (CIIs). ...
of sensitivity, thus special security mechanisms can be put into place to differing degrees to protect the data according to its sensitivity. • Secure protocols: to protect the systems against covert ...
doi:10.1109/jsyst.2015.2487684
fatcat:6kebjfw5zjcirgquxsi5n7gfte
Scriptless attacks
2012
Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12
Through several case studies, we introduce the so called scriptless attacks and demonstrate that an adversary might not need to execute code to preserve his ability to extract sensitive information from ...
well protected websites. ...
As a further contribution, we propose new protection mechanisms against this new class of attacks. ...
doi:10.1145/2382196.2382276
dblp:conf/ccs/HeiderichNSHS12
fatcat:qf27r473mvdtxakegcujj6w6cm
Fault-based attacks on cryptographic hardware
2013
2013 IEEE 16th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS)
In the recent years, a large number of fault-based attacks and countermeasures to protect cryptographic circuits against them have been developed. ...
By doing so, the attacker obtains supplementary information that she can utilize during cryptanalysis to derive protected data, such as secret keys. ...
COUNTERMEASURES AND DESIGN CONSIDERATIONS Protection against fault-based attacks can work on multiple abstraction levels: technology, circuit, information, or application. ...
doi:10.1109/ddecs.2013.6549781
dblp:conf/ddecs/PolianK13
fatcat:463ms2z3draxdkuox4i72ib7fi
Data exfiltration: A review of external attack vectors and countermeasures
2018
Journal of Network and Computer Applications
Context: One of the main targets of cyber-attacks is data exfiltration, which is the leakage of sensitive or private data to an unauthorized entity. ...
These countermeasures aim to detect, prevent, or investigate exfiltration of sensitive or private data. ...
Category
Paper
Data
state
Contribution
Provide Protection against
Data
Classification
Liu et al. [39]
In use
Leverages hardware-based virtualization to separate sensitive data
from non-sensitive ...
doi:10.1016/j.jnca.2017.10.016
fatcat:fweg67tparct5owb3r4qrpgvxq
DISCO: Dynamic and Invariant Sensitive Channel Obfuscation for deep neural networks
[article]
2021
arXiv
pre-print
We propose diverse attack schemes for sensitive inputs \& attributes and demonstrate the effectiveness of DISCO against state-of-the-art methods through quantitative and qualitative evaluation. ...
We posit that selectively removing features in this latent space can protect the sensitive information and provide a better privacy-utility trade-off. ...
Baselines For attacks on sensitive attributes, we baseline with ARL based methods [29, 24, 23] which are state-ofthe-art on attribute leakage. ...
arXiv:2012.11025v2
fatcat:dqg6gkx7mvh7dka3sqdcufcwd4
Survey on Cache-Based Side-Channel Attacks in Cloud Computing
2020
International Journal of Emerging Trends in Engineering Research
that can be implemented to reduce the Cache based side-channel attacks. ...
Cache based side-channel attacks are powerful, agile and more suitable to be executed in a cloud environment rather than in traditional networks because of cloud computing architecture. ...
based side-channel attacks Table 1 : 1 List of approaches to prevent Cache Side Channel attack environment and running them against the attacks to Approach Technique Result evaluated defense against built ...
doi:10.30534/ijeter/2020/11842020
fatcat:spnlmp74urcyferi4hsxk4epxm
In Hardware We Trust
2019
Proceedings of the 56th Annual Design Automation Conference 2019 on - DAC '19
If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. ...
A promising approach is to manage hardware by a small software Trusted Computing Base (TCB) to create TEEs, e.g., protecting sensitive user-space code on mobile devices based on ARM TrustZone [7] , or ...
Fault attacks aim at exposing sensitive information triggered by irregular conditions that lead to faulty computations. ...
doi:10.1145/3316781.3323480
dblp:conf/dac/BatinaJMSS19
fatcat:kuppngfcgrh4vngiln2ho5dwtq
« Previous
Showing results 1 — 15 out of 88,608 results