A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2009; you can also visit the original URL.
The file type is application/pdf
.
Filters
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
[chapter]
2008
Lecture Notes in Computer Science
In this paper we describe a lightweight implementation of the Secure Sockets Layer (SSL) protocol with a focus on small code size and low memory usage. ...
Furthermore, we aimed to secure the SSL handshake against side-channel attacks (in particular simple power analysis) by eliminating all data-dependent or key-dependent branches and memory accesses from ...
In the present paper we analyze the workload characteristics of a "lightweight" SSL implementation optimized for small code size and low memory footprint. ...
doi:10.1007/978-3-540-89641-8_25
fatcat:bdzahwo3w5gdhjnpb4rz72za7i
A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things
2020
IEEE Access
Side-channel attacks the use of some or all of the data to gain the key that the device is using. ...
Multi-layer attacks
Side Channel Information Attacks To recover key information By time, power, fault analysis of a system Lead to other attacks DoS [137] , [138] To make service unavailable One way ...
doi:10.1109/access.2020.3037359
fatcat:pw4fsmelmjgc5anm7hp537l63e
Detection of illicit cryptomining using network metadata
2021
EURASIP Journal on Information Security
In this attack, victims' computing resources are abused to mine cryptocurrency for the benefit of attackers. ...
AbstractIllicit cryptocurrency mining has become one of the prevalent methods for monetization of computer security incidents. ...
Side channels have also been successfully used for detection [86] . ...
doi:10.1186/s13635-021-00126-1
fatcat:ybcsiwv6hjcefj2kepzpoz6tk4
SecureStreams
2017
Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems - DEBS '17
The experimental results of SecureStreams are promising: while offering a fluent scripting language based on Lua, our middleware delivers high processing throughput, thus enabling developers to implement ...
The growing adoption of distributed data processing frameworks in a wide diversity of application domains challenges end-to-end integration of properties like security, in particular when considering deployments ...
Rafael Pires is also sponsored by CNPq, National Counsel of Technological and Scientific Development, Brazil. ...
doi:10.1145/3093742.3093927
dblp:conf/debs/HavetPFPRS17
fatcat:jyawgnpefrabxkecacrj5vuhuy
Autonomic Response to Distributed Denial of Service Attacks
[chapter]
2001
Lecture Notes in Computer Science
Acknowledgments The authors would like to acknowledge the valuable suggestions of the anonymous reviewers. ...
Acknowledgements The authors would like to thank Jack Oden for distilling and Mary Ellen Leishear for editing the original report into this article. ...
The Gauntlet SSL plug proxy is a very lightweight proxy in comparison to the MPOG since the SSL proxy does not actually perform any SSL specific functionality on the connection. ...
doi:10.1007/3-540-45474-8_9
fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm
The Roadmap to 6G Security and Privacy
2021
IEEE Open Journal of the Communications Society
All in all, this work intends to provide enlightening guidance for the subsequent research of 6G security and privacy at this initial phase of vision towards reality. ...
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. ...
The Commission is not responsible for any use that may be made of the information it contains. A. ...
doi:10.1109/ojcoms.2021.3078081
fatcat:r5g662rcxjcgvjfc2el3lesdzy
A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges
2021
Electronics
Finally, future research work and possible areas of implementation and consideration are given to discuss open issues. ...
Even though CC is a great innovation in the aspect of computing with ease of access, it also has some drawbacks. With the increase of cloud usage, security issues are proportional to the increase. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/electronics10151811
fatcat:nqkyuoti5nd2pl5lo3hwcmu3xe
Cyberspace Security Using Adversarial Learning and Conformal Prediction
2015
Intelligent Information Management
methods characteristic of principled demarcation using cohorts and sensitivity analysis to hedge on the prediction outcomes including negative selection, on one side, and providing credibility and confidence ...
Conformal prediction leverages apparent relationships between immunity and intrusion detection using non-conformity measures characteristic of affinity, a typicality, and surprise, to recognize patterns ...
A more fundamental goal is to engineer secure hardware than can itself limit security breaches, such as the cache side-channel attacks that today's cache architectures allow" [100] . the strangeness of ...
doi:10.4236/iim.2015.74016
fatcat:wqiu3pkl6zeurlr3mizdahhgd4
Effective Security by Obscurity
[article]
2022
arXiv
pre-print
"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. ...
The ramifications of this has resulted in these techniques going underused and underappreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information ...
The formatting of this paper is courtesy of the Elsevier Procedia Computer Science template for Microsoft Word [15] . ...
arXiv:2205.01547v1
fatcat:ym4gkjs53zb2pbg7kzuwshpfm4
Architectural Techniques for Improving NAND Flash Memory Reliability
[article]
2018
arXiv
pre-print
These errors reduce flash reliability and limit the lifetime of a flash memory device. We aim to improve flash reliability with a multitude of low-cost architectural techniques. ...
We analyze flash error characteristics and workload behavior through experimental characterization, and design new flash controller algorithms that use the insights gained from our analysis to improve ...
LB is inside a hidden GBB (left side of the addition); and (2) for an LB that is not in a hidden GBB, the probability of any codeword failing (right side of the addition). ...
arXiv:1808.04016v1
fatcat:fotned4yajc2xmaoezwjdrgypu
Aggregating privatized medical data for secure querying applications
2017
Future generations computer systems
and show that it is resistant to these attacks. ...
revised data privatization method and shows that it is resistant to these attacks. ...
and oxygen to the heart while also reducing the heart's workload. ...
doi:10.1016/j.future.2016.11.028
fatcat:fd6kzkwccvhuhltszlq7ysj4yq
Computer Networking
[article]
2017
Zenodo
Indeed, it's our aim in this book to provide you with a modern introduction to the dynamic field of computer networking, giving you the principles and practical insights you'll need to understand not only ...
And if so, is it possible that it actually could be both interesting and fun to learn about computer networks? Fortunately, the answer to all of these questions is a resounding YES! ...
On the receiving side, rdt_rcv() will be called when a packet arrives from the receiving side of the channel. ...
doi:10.5281/zenodo.5599466
fatcat:roncomlhjrf7dafpacammhf6xq
Hardware-Accelerated Platforms and Infrastructures for Network Functions: A Survey of Enabling Technologies and Research Studies
2020
IEEE Access
Containers have been designed to create a lightweight alternative to VMs. ...
that are implemented in the user-space are vulnerable to security attacks due to limited OS protection. ...
doi:10.1109/access.2020.3008250
fatcat:kv4znpypqbatfk2m3lpzvzb2nu
Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods
2022
IEEE Transactions on Network and Service Management
As a result, migrating sensitive workloads to the cloud requires enterprises to first assess risks by gaining knowledge of possible network services' anomalies and second, to build trust in the cloud by ...
implementations flaws by NFV developers. ...
ACKNOWLEDGMENT This study has been carried out with financial support from the French State, managed by the French National Research Agency (ANR) in the frame of the "Investments for the future" Programme ...
doi:10.1109/tnsm.2022.3144582
fatcat:2qbw6ktdnrg7hbc5rqrcevxse4
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture
2021
Zenodo
Investigations for the improvement of the Cyber Security using Cloud Computing methods and Architecture: D.Sc. Thesis ...
The ability to augment a private cloud with the resources of a public cloud can be used to manage any unexpected surges in workload. ...
We considered two sorts of sensors sent to acknowledge the side effects of cyber-attacks, in the particular host and system sensors. ...
doi:10.5281/zenodo.5148421
fatcat:lzanqvxdlre2dh3hdhjxibdrim
« Previous
Showing results 1 — 15 out of 80 results