80 Hits in 7.7 sec

Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks [chapter]

Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger
2008 Lecture Notes in Computer Science  
In this paper we describe a lightweight implementation of the Secure Sockets Layer (SSL) protocol with a focus on small code size and low memory usage.  ...  Furthermore, we aimed to secure the SSL handshake against side-channel attacks (in particular simple power analysis) by eliminating all data-dependent or key-dependent branches and memory accesses from  ...  In the present paper we analyze the workload characteristics of a "lightweight" SSL implementation optimized for small code size and low memory footprint.  ... 
doi:10.1007/978-3-540-89641-8_25 fatcat:bdzahwo3w5gdhjnpb4rz72za7i

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things

Shapla Khanam, Ismail Bin Ahmedy, Mohd Yamani Idna Idris, Mohamed Hisham Jaward, Aznul Qalid Bin Md Sabri
2020 IEEE Access  
Side-channel attacks the use of some or all of the data to gain the key that the device is using.  ...  Multi-layer attacks Side Channel Information Attacks To recover key information By time, power, fault analysis of a system Lead to other attacks DoS [137] , [138] To make service unavailable One way  ... 
doi:10.1109/access.2020.3037359 fatcat:pw4fsmelmjgc5anm7hp537l63e

Detection of illicit cryptomining using network metadata

Michele Russo, Nedim Šrndić, Pavel Laskov
2021 EURASIP Journal on Information Security  
In this attack, victims' computing resources are abused to mine cryptocurrency for the benefit of attackers.  ...  AbstractIllicit cryptocurrency mining has become one of the prevalent methods for monetization of computer security incidents.  ...  Side channels have also been successfully used for detection [86] .  ... 
doi:10.1186/s13635-021-00126-1 fatcat:ybcsiwv6hjcefj2kepzpoz6tk4


Aurélien Havet, Rafael Pires, Pascal Felber, Marcelo Pasin, Romain Rouvoy, Valerio Schiavoni
2017 Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems - DEBS '17  
The experimental results of SecureStreams are promising: while offering a fluent scripting language based on Lua, our middleware delivers high processing throughput, thus enabling developers to implement  ...  The growing adoption of distributed data processing frameworks in a wide diversity of application domains challenges end-to-end integration of properties like security, in particular when considering deployments  ...  Rafael Pires is also sponsored by CNPq, National Counsel of Technological and Scientific Development, Brazil.  ... 
doi:10.1145/3093742.3093927 dblp:conf/debs/HavetPFPRS17 fatcat:jyawgnpefrabxkecacrj5vuhuy

Autonomic Response to Distributed Denial of Service Attacks [chapter]

Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid
2001 Lecture Notes in Computer Science  
Acknowledgments The authors would like to acknowledge the valuable suggestions of the anonymous reviewers.  ...  Acknowledgements The authors would like to thank Jack Oden for distilling and Mary Ellen Leishear for editing the original report into this article.  ...  The Gauntlet SSL plug proxy is a very lightweight proxy in comparison to the MPOG since the SSL proxy does not actually perform any SSL specific functionality on the connection.  ... 
doi:10.1007/3-540-45474-8_9 fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm

The Roadmap to 6G Security and Privacy

Pawani Porambage, Gurkan Gur, Diana Pamela Moya Osorio, Madhusanka Liyanage, Andrei Gurtov, Mika Ylianttila
2021 IEEE Open Journal of the Communications Society  
All in all, this work intends to provide enlightening guidance for the subsequent research of 6G security and privacy at this initial phase of vision towards reality.  ...  Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion.  ...  The Commission is not responsible for any use that may be made of the information it contains. A.  ... 
doi:10.1109/ojcoms.2021.3078081 fatcat:r5g662rcxjcgvjfc2el3lesdzy

A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges

Abeer Iftikhar Tahirkheli, Muhammad Shiraz, Bashir Hayat, Muhammad Idrees, Ahthasham Sajid, Rahat Ullah, Nasir Ayub, Ki-Il Kim
2021 Electronics  
Finally, future research work and possible areas of implementation and consideration are given to discuss open issues.  ...  Even though CC is a great innovation in the aspect of computing with ease of access, it also has some drawbacks. With the increase of cloud usage, security issues are proportional to the increase.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10151811 fatcat:nqkyuoti5nd2pl5lo3hwcmu3xe

Cyberspace Security Using Adversarial Learning and Conformal Prediction

Harry Wechsler
2015 Intelligent Information Management  
methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence  ...  Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns  ...  A more fundamental goal is to engineer secure hardware than can itself limit security breaches, such as the cache side-channel attacks that today's cache architectures allow" [100] . the strangeness of  ... 
doi:10.4236/iim.2015.74016 fatcat:wqiu3pkl6zeurlr3mizdahhgd4

Effective Security by Obscurity [article]

J. Christian Smith
2022 arXiv   pre-print
"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security.  ...  The ramifications of this has resulted in these techniques going underused and underappreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information  ...  The formatting of this paper is courtesy of the Elsevier Procedia Computer Science template for Microsoft Word [15] .  ... 
arXiv:2205.01547v1 fatcat:ym4gkjs53zb2pbg7kzuwshpfm4

Architectural Techniques for Improving NAND Flash Memory Reliability [article]

Yixin Luo
2018 arXiv   pre-print
These errors reduce flash reliability and limit the lifetime of a flash memory device. We aim to improve flash reliability with a multitude of low-cost architectural techniques.  ...  We analyze flash error characteristics and workload behavior through experimental characterization, and design new flash controller algorithms that use the insights gained from our analysis to improve  ...  LB is inside a hidden GBB (left side of the addition); and (2) for an LB that is not in a hidden GBB, the probability of any codeword failing (right side of the addition).  ... 
arXiv:1808.04016v1 fatcat:fotned4yajc2xmaoezwjdrgypu

Aggregating privatized medical data for secure querying applications

Kalpana Singh, Lynn Batten
2017 Future generations computer systems  
and show that it is resistant to these attacks.  ...  revised data privatization method and shows that it is resistant to these attacks.  ...  and oxygen to the heart while also reducing the heart's workload.  ... 
doi:10.1016/j.future.2016.11.028 fatcat:fd6kzkwccvhuhltszlq7ysj4yq

Computer Networking [article]

Kurose Ross
2017 Zenodo  
Indeed, it's our aim in this book to provide you with a modern introduction to the dynamic field of computer networking, giving you the principles and practical insights you'll need to understand not only  ...  And if so, is it possible that it actually could be both interesting and fun to learn about computer networks? Fortunately, the answer to all of these questions is a resounding YES!  ...  On the receiving side, rdt_rcv() will be called when a packet arrives from the receiving side of the channel.  ... 
doi:10.5281/zenodo.5599466 fatcat:roncomlhjrf7dafpacammhf6xq

Hardware-Accelerated Platforms and Infrastructures for Network Functions: A Survey of Enabling Technologies and Research Studies

Prateek Shantharama, Akhilesh S. Thyagaturu, Martin Reisslein
2020 IEEE Access  
Containers have been designed to create a lightweight alternative to VMs.  ...  that are implemented in the user-space are vulnerable to security attacks due to limited OS protection.  ... 
doi:10.1109/access.2020.3008250 fatcat:kv4znpypqbatfk2m3lpzvzb2nu

Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods

Moubarak Zoure, Toufik Ahmed, Laurent Reveillere
2022 IEEE Transactions on Network and Service Management  
As a result, migrating sensitive workloads to the cloud requires enterprises to first assess risks by gaining knowledge of possible network services' anomalies and second, to build trust in the cloud by  ...  implementations flaws by NFV developers.  ...  ACKNOWLEDGMENT This study has been carried out with financial support from the French State, managed by the French National Research Agency (ANR) in the frame of the "Investments for the future" Programme  ... 
doi:10.1109/tnsm.2022.3144582 fatcat:2qbw6ktdnrg7hbc5rqrcevxse4

Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture

Dr. Sai Manoj Kudavaralli
2021 Zenodo  
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis  ...  The ability to augment a private cloud with the resources of a public cloud can be used to manage any unexpected surges in workload.  ...  We considered two sorts of sensors sent to acknowledge the side effects of cyber-attacks, in the particular host and system sensors.  ... 
doi:10.5281/zenodo.5148421 fatcat:lzanqvxdlre2dh3hdhjxibdrim
« Previous Showing results 1 — 15 out of 80 results