Filters








1,485 Hits in 4.2 sec

Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks

Louis Goubin, Matthieu Rivain, Junwei Wang
2020 Transactions on Cryptographic Hardware and Embedded Systems  
In this article, we revisit state-of-the-art countermeasures employed in white-box cryptography, and we discuss possible ways to combine them.  ...  The goal of white-box cryptography is to protect secret keys embedded in a cryptographic software deployed in an untrusted environment.  ...  At the end of the program, the outputs of the 4 interpretations are merged.  ... 
doi:10.13154/tches.v2020.i3.454-482 dblp:journals/tches/GoubinRW20 fatcat:pdmjsy2c6jb2xjz7uilipj7oam

Source Attribution of Cryptographic API Misuse in Android Applications

Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov
2018 Zenodo  
We developed BinSight, a static program analyzer that supports source attribution, and we analyzed 132K Android applications collected in years 2012, 2015, and 2016.  ...  Our results suggest that third-party libraries are the main source of cryptographic API misuse.  ...  Static program slicing is the computation of a set of program statements, called slices, that may a ect the values of certain variables at a particular program point of interest, referred to as a slicing  ... 
doi:10.5281/zenodo.3264740 fatcat:th4d55236vevtmgbkasgwchn3u

Revisiting the Principles of NATO Burden-Sharing

Alexander Mattelaer
2016 Parameters  
Similarly, there is little doubt more output could be generated from the 235 billion dollar total sum of European defense expenditure.  ...  Measuring defense spending per square kilometer of national territory would constitute an extreme example of this kind. Last, but not least, there is the discussion on common funding.  ... 
doi:10.55540/0031-1723.2821 fatcat:d5o4k2kefjdifj3otlvwo2w5ce

A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later

Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili, Andrew Marrington
2016 Computers & security  
A cyber forensics needs analysis survey: revisiting the domain's needs a decade later.  ...  open-source tools (4) research on encryption, malware, and trail obfuscation; (5) revised laws (specific, up-to-date, and which protect user privacy); (6) better communication, especially between/with  ...  https://en.wikipedia.org/wiki/Friedman_test (last accessed 2015-08-10).4 Chi-squared test, p = 0.005. Chi-squared test, p = 0.025.  ... 
doi:10.1016/j.cose.2015.10.007 fatcat:ioq2zeub3ff3vfie6n6yg2odga

Tax Expenditure Framework Legislation

Edward D. Kleinbard
2010 Social Science Research Network  
As a consequence, tax expenditures have become the preferred vehicle for delivering new spending programs.  ...  As a consequence, tax expenditures have become the preferred vehicle for delivering new spending programs.  ...  One consequence of this predilection for tax expenditures is the obfuscation of the size and activities of our government.  ... 
doi:10.2139/ssrn.1531945 fatcat:6tjlnbt3dzcq5lides5nclcmxm

Tax Expenditure Framework Legislation

Edward D. Kleinbard
2010 National tax journal  
As a consequence, tax expenditures have become the preferred vehicle for delivering new spending programs.  ...  Moreover, the low salience of tax expenditures clouds understanding of the government's allocative interventions among not only the public but also many policymakers.  ...  One consequence of this predilection for tax expenditures is the obfuscation of the size and activities of our government.  ... 
doi:10.17310/ntj.2010.2.09 fatcat:ukjsfpatdnfzfjgcw23yf5yzua

Auto-tabling for subproblem presolving in MiniZinc

Jip J. Dekker, Gustav Björdal, Mats Carlsson, Pierre Flener, Jean-Noël Monette
2017 Constraints  
Despite the possibility of achieving higher solving performance, this tabling reformulation is often not tried, because it is tedious to perform; further, if successful, it obfuscates the original model  ...  thereby eliminating both the tedium and the obfuscation.  ...  A party is made of four cubes placed in a 2 × 2 square such that the four icons in the centre of the visible side of the square have, for each of the three attributes, either all equal or all different  ... 
doi:10.1007/s10601-017-9270-5 fatcat:ybvvxytgsbebrjxyv67lo4kwqu

Square Span Programs with Applications to Succinct NIZK Arguments [chapter]

George Danezis, Cédric Fournet, Jens Groth, Markulf Kohlweiss
2014 Lecture Notes in Computer Science  
Keywords: Square span program, quadratic span program, SNARKs, non-interactive zero-knowledge arguments of knowledge.  ...  We propose a new characterization of NP using square span programs (SSPs). We first characterize NP as affine map constraints on small vectors.  ...  The simplifications are twofold: (i) our representation of boolean functions no longer requires wire checkers and (ii) square span programs consist of only a single set of polynomials that are summed and  ... 
doi:10.1007/978-3-662-45611-8_28 fatcat:cvxyi5wsijdothpw6xnwhokmdi

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption

Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
It provides a way to obfuscate the number and list of items a user rated without harming the accuracy of recommendation, and additionally protects recommender's tuning parameters for business benefit and  ...  With the data structure, the proposed protocol requires dozens of times less computation cost over those of previous works.  ...  To the best of our knowledge there is no known mechanism for privacy-preserving matrix factorization which meets all of previously mentioned requirements.  ... 
doi:10.1145/2897845.2897875 dblp:conf/ccs/KimKKKYS16 fatcat:7qnupcletvbk7ea3rti3mbc5nu

Library as Infrastructure

Shannon Mattern
2014 Places  
knowledge and program our values.  ...  They have been expected to symbolize the eminence of a ruler or state, to integrally link “knowledge” and “power” — and, more recently, to serve as “community centers,” “public squares” or “think tanks  ... 
doi:10.22269/140609 fatcat:hy7xr5lltvha7hlwepfv4uhm5y

CutLHCO: A Consumer-Level Tool for Implementing Generic Collider Data Selection Cuts in the Search for New Physics [article]

Joel W. Walker
2012 arXiv   pre-print
The structure, function, invocation and usage of the most recent CutLHCO 2.0 program version are documented thoroughly, including a detailed deconstruction of several example card file specifications.  ...  A new computer program named CutLHCO is introduced, whose function is the implementation of generic data selection cuts on collider event specification files in the standardized .lhco format.  ...  This research was also supported in part by the Sam Houston State University 2011-2012 Enhancement Research Grant program.  ... 
arXiv:1207.3383v1 fatcat:74rbjhd3x5d6tgg5njtyvysuy4

IMF conditionality and development policy space, 1985–2014

Alexander E. Kentikelenis, Thomas H. Stubbs, Lawrence P. King
2016 Review of International Political Economy  
We revisit two long-standing controversies: Has the policy content of IMF programmes evolved to allow for more policy space?  ...  We find little evidence of a fundamental transformation of IMF conditionality.  ...  the program' (Leckow 2002) .  ... 
doi:10.1080/09692290.2016.1174953 fatcat:25ocrzujlrh3ho7f3yantcbyzm

Online Privacy and Aging of Digital Artifacts

Reham Ebada Mohamed, Sonia Chiasson
2018 Symposium On Usable Privacy and Security  
Through a lab study with 30 participants, we probe the concept of aging/decaying of digital artifacts.  ...  The decaying of digital artifacts gradually degrades content, thereby becoming less accessible to audiences.  ...  Full functionality -positive-sum, not zero-sum 5. End-to-end security -full lifecycle protection 6. Visibility and transparency -keep it open 7.  ... 
dblp:conf/soups/MohamedC18 fatcat:er3ytezj7jer5la52t4ibbu5hu

Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs

Alex Biryukov, Dmitry Khovratovich, Léo Perrin
2017 IACR Transactions on Symmetric Cryptology  
With the same technique we attack 6 (out of 8) rounds of Khazad, the legacy 64-bit blockcipher.  ...  Using the new result, we attack 7 (out of 9) rounds of Kuznyechik, the recent Russian blockcipher standard, thus halving its security margin.  ...  Acknowledgement The work of Léo Perrin is supported by the CORE project ACRYPT (ID C12-15-4009992) funded by the Fonds National de la Recherche, Luxembourg.  ... 
doi:10.46586/tosc.v2016.i2.226-247 fatcat:tbe43t6ivnemlfjybb2ukndb2i

Minimizing Side-Channel Attack Vulnerability via Schedule Randomization

Nils Vreman, Richard Pates, Kristin Kruger, Gerhard Fohler, Martina Maggio
2019 2019 IEEE 58th Conference on Decision and Control (CDC)  
We then propose an algorithm to construct a set of schedules that achieves a differentation level as high as possible, using the fewest number of schedules, for tasksets with implicit deadlines.  ...  Online, the scheduler selects a schedule among a set of available ones, trying to achieve an execution trace that is as different as possible from previous ones, therefore minimizing the amount of information  ...  "sum of x < 5" statements. Constraint programming defines the domain in which a solution is located, rather than finding an algorithmic solution to the problem.  ... 
doi:10.1109/cdc40024.2019.9030144 dblp:conf/cdc/VremanPKFM19 fatcat:xxnwqdn42ncgllzfsfi3t7jixm
« Previous Showing results 1 — 15 out of 1,485 results