Filters








131 Hits in 6.0 sec

Key recovery against 3DES in CPU smart card based on improved correlation power analysis

Yanting Ren, Liji Wu, Hexin Li, Xiangyu Li, Xiangmin Zhang, An Wang, Hongyi Chen
2016 Tsinghua Science and Technology  
In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures.  ...  Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles.  ...  Preprocessing: alignment An unstable clock, a random delay, or inaccurate triggering in measurement [2] usually causes misalignment of the power traces.  ... 
doi:10.1109/tst.2016.7442503 fatcat:xlmygjcvavbyxf4lt6jjd2hioi

RAM: Rapid Alignment Method [chapter]

Ruben A. Muijrers, Jasper G. J. van Woudenberg, Lejla Batina
2011 Lecture Notes in Computer Science  
The comparison with other known methods favors our solution in terms of efficiency and computational complexity.  ...  Several countermeasures against side-channel analysis result in misalignment of power traces, in order to make DPA more difficult.  ...  Acknowledgments We would like to thank Riscure for providing an environment for fruitful discussion during the research, and for providing the side-channel analysis platform that was used for this work  ... 
doi:10.1007/978-3-642-27257-8_17 fatcat:6pg3mevvgbbgjgkcduo2t6ln6y

Synchronous sampling and clock recovery of internal oscillators for side channel analysis and fault injection

Colin O'Flynn, Zhizhang Chen
2014 Journal of Cryptographic Engineering  
By synchronizing the sampling clock to the clock of the target device, the sample rate requirements are considerably relaxed; the attack will succeed with a much lower sample rate.  ...  This attack is characterized under four conditions: with a stable crystal-oscillator based clock, with a clock that is randomly varied between 3.9 MHz-13 MHz, with an internal oscillator that is randomly  ...  In this form an 'offset' parameter m is added, which slides the comparison window across all points in the recorded trace.  ... 
doi:10.1007/s13389-014-0087-5 fatcat:wytlkduzsnbunnznimr3l336ze

Encoding Power Traces as Images for Efficient Side-Channel Analysis [article]

Benjamin Hettwer
2020 arXiv   pre-print
This is a crucial improvement, as the amount of traces that can be recorded by an attacker is often very limited in real-life applications.  ...  By allowing the neural network to interpret the trace as an image, we are able to significantly reduce the number of required attack traces for a correct key guess.We also demonstrate that the attack efficiency  ...  Such misalignments can occur due to an unstable measurement setup or a jitter-based countermeasure (e.g. by creating an unstable clock signal [32] ).  ... 
arXiv:2004.11015v2 fatcat:eu6pnmvgpjggbhmbwbjk6m63lu

EFFICIENT CNN-BASED PROFILED SIDE CHANNEL ATTACKS

Ngoc Quy Tran, Hong Quang Nguyen
2021 Journal of Computer Science and Cybernetics  
To verify the proposed attacks, experiments were performed on a trace set collected from an Atmega8515 smart card when it performs AES-128 encryption, a DPA contest v4 dataset and the ASCAD public dataset  ...  In this paper, we propose an efficient profiled attack for on unprotected and masking-protected cryptographic devices based on two CNN architectures, called CNNn, CNNd respectively.  ...  CNN architecture for protected devices Attacks against the masking-protected devices are known as higher-order side channel attacks, where an attacker needs to combine independent leakage information by  ... 
doi:10.15625/1813-9663/37/1/15418 fatcat:vks5bxdzu5elbdujck4jkjhcxu

Forensic identification of GSM mobile phones

Jakob Hasse, Thomas Gloe, Martin Beck
2013 Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec '13  
An implementation of a specialised receiver software allows passive monitoring of GSM traffic along with physical layer burst extraction even for handover and frequency hopping techniques.  ...  Using our characteristics, we could distinguish 13 mobile phones at an overall success rate of 97.62 % under realworld conditions.  ...  Further analysis should target the robustness against potential attacks trying to forge a device signature. IH&MMSec'13, June 17-19, 2013, Montpellier, France.  ... 
doi:10.1145/2482513.2482529 dblp:conf/ih/HasseGB13 fatcat:zk6ynnqo4zdzxcxwlt4akthsoe

Techniques to Improve Reliability in an IoT Architecture Framework for Intelligent Products

Ciprian M. Coman, Giuseppe D'Amico, Adrian V. Coman, Adriana Florescu
2021 IEEE Access  
A sliding windows mechanism is widely used to integrate flow control and error control.  ...  Virtual segregation is done at software level and it is often paired with end-to-end encryption to ensure data privacy even if an attacker accesses the virtual private network.  ... 
doi:10.1109/access.2021.3072168 fatcat:6ajmglnnqbaxnhx7776bajcrxq

Passive internet measurement: Overview and guidelines based on experiences

Wolfgang John, Sven Tafvelin, Tomas Olovsson
2010 Computer Communications  
The challenges are discussed in order of their chronological appearance: First, a number of legal and ethical issues have to be sorted out with legislators and network operators, followed by operational  ...  , combining the sliding window and convex-hull approaches.  ...  degree, given an attacker with sufficient know-how, creativity and persistency [28, [30] [31] [32] .  ... 
doi:10.1016/j.comcom.2009.10.021 fatcat:uriasdlwuvbgfjmjpyonamskdy

A Survey on Industrial Control System Testbeds and Datasets for Security Research [article]

Mauro Conti and Denis Donadel and Federico Turrin
2021 arXiv   pre-print
., chemical industries), attacks can lead to devastating physical damages.  ...  In this paper, we provide a deep and comprehensive overview of ICSs, presenting the architecture design, the employed devices, and the security protocols implemented.  ...  To do so, the authors implement a sliding-window approach to divide the multivariate time series into sub-sequences. On WADI, MAD-GAN obtains a precision of 0.53 and an F1-Score of 0.62.  ... 
arXiv:2102.05631v3 fatcat:2kmqsd5cozhijllwlspobrjezq

Security Analysis of PUF-based Key Generation and Entity Authentication

Jeroen Delvaux
2017 Zenodo  
PUFs can augment the security architecture of an ever-increasing number of electronic devices that access our personal data and/or represent our identities.  ...  A PUF circuit is designed to be sensitive to process variations, i.e., challenged with a binary input, it provides a binary, device-unique response.  ...  However, neither the procedures SSGen and SSRep nor the transfer of helper data are an explicit part of the proposed protocol.  ... 
doi:10.5281/zenodo.2643392 fatcat:2pcr7p76qjbtnh36fuxsdk7enq

Event-based applications and enabling technologies

Annika Hinze, Kai Sachs, Alejandro Buchmann
2009 Proceedings of the Third ACM International Conference on Distributed Event-Based Systems - DEBS '09  
STAC, an organization supported by financial institutions, is benchmarking CEP engines. SPEC has released its SPECjms2007 benchmark [44] .  ...  , and (2) continuous or streaming queries based on the operators of relational algebra applied to subsets of streams of tuples (sliding windows) [7] .  ...  These are briefly described below and then correlated with the applications in Table 1 .  ... 
doi:10.1145/1619258.1619260 dblp:conf/debs/HinzeSB09 fatcat:ca66ahf6b5dxpkeackhxlf7q2y

A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks

Anderson Morais, Ana Cavalli
2013 Journal on spesial topics in mobile networks and applications  
We assume that each node clock is synchronized with the global clock of main machine.  ...  Sequence Number values out of the actual Sliding Window size, i.e., the range of Sequence Number received so far for that Originator.  ... 
doi:10.1007/s11036-013-0457-8 fatcat:acrm4mwz3bbepb45vhst2vojwu

Detecting Insider Threats Using RADISH: A System for Real-Time Anomaly Detection in Heterogeneous Data Streams

Brock Bose, Bhargav Avasarala, Srikanta Tirthapura, Yung-Yu Chung, Donald Steiner
2017 IEEE Systems Journal  
We demonstrate an application of this system to the problem of detecting insider threats, namely, the misuse of an organization's resources by users of the system and present results of our experiments  ...  In contrast with batch data-processing systems, such as Hadoop, that can have high latency, our architecture allows for ingest and analysis of data on the fly, thereby detecting and responding to anomalous  ...  This data, in general, is not available to access control systems, but is helpful in establishing correlations if anomalous behavior is associated with users' devices.  ... 
doi:10.1109/jsyst.2016.2558507 fatcat:s3fyxysurff5jc5qq2dwamwire

Analysis and Mitigation of Remote Side-Channel and Fault Attacks on the Electrical Level

Jonas Krautter, Mehdi B. Tahoori, Thomas Eisenbarth
2022
Even a single bit with unstable output, which depends on the supply voltage, can be enough to recover a secret encryption key.  ...  Instead, we increment i by s 4 , where the overlap between the sliding windows is 3 4 • s.  ...  Assembly Code Patterns for the x86 architecture Here, we present the assembly code that has been used in this work to evaluate classification in an x86-64 Intel Xeon desktop/server setup.  ... 
doi:10.5445/ir/1000144660 fatcat:kth32c56kzfmzlblmhp75pprju

A methodology for studying persistency aspects of internet flows

Jörg Wallerich, Holger Dreger, Anja Feldmann, Balachander Krishnamurthy, Walter Willinger
2005 Computer communication review  
Acknowledgments Orion Hodson assisted with our TBIT measurements. Thanks also to Gorry Fairhurst, Sourabh Ladha, and the anonymous reviewers for their helpful feedback.  ...  ACKNOWLEDGEMENTS The authors are grateful to Bob Briscoe, Jon Crowcroft, Christophe Diot, Richard Gibbens, Damon Wischik and two anonymous referees for their comments on an earlier draft of this paper.  ...  Each ACK that acknowledges new data causes TCP's transmission window to slide. In the normal case, with delayed ACKs, the window slides by 2 segments for each ACK.  ... 
doi:10.1145/1064413.1064417 fatcat:b5leqpkvmnd5paw2vws4mqhlme
« Previous Showing results 1 — 15 out of 131 results