Results 1 to 10 of about 3,209,774 (327)
On the spectral features of robust probing security
In this work we provide a spectral formalization of non-interference in the presence of glitches. Our goal is to present new theoretical and practical tools to reason about robust-d-probing security.
Maria Chiara Molteni, Vittorio Zaccaria
doaj +7 more sources
Random Probing Security with Precomputation
At Eurocrypt 2014, Duc, Dziembowski and Faust proposed the random probing model to bridge the gap between the probing model proposed at Crypto 2003 and the noisy model proposed at Eurocrypt 2013.
Bohan Wang +3 more
doaj +5 more sources
Probing Security through Input-Output Separation and Revisited Quasilinear Masking
The probing security model is widely used to formally prove the security of masking schemes. Whenever a masked implementation can be proven secure in this model with a reasonable leakage rate, it is also provably secure in a realistic leakage model known
Dahmun Goudarzi +3 more
doaj +4 more sources
ADD-based Spectral Analysis of Probing Security
In this paper, we introduce a novel exact verification methodology for non-interference properties of cryptographic circuits. The methodology exploits the Algebraic Decision Diagram representation of the Walsh spectrum to overcome the potential slow down associated with its exact verification against non-interference constraints.
Maria Chiara Molteni +2 more
semanticscholar +5 more sources
Hybrid epidemics--a case study on computer worm conficker. [PDF]
Conficker is a computer worm that erupted on the Internet in 2008. It is unique in combining three different spreading strategies: local probing, neighbourhood probing, and global probing.
Changwang Zhang +2 more
doaj +5 more sources
Concrete Evaluation of the Random Probing Security [PDF]
We study masked implementation's security when an adversary randomly probes each of its internal variables, intending to recover non-trivial knowledge about its secrets. We introduce a novel metric called Secret Recovery Probability (SRP) for assessing the informativeness of the probing leakages about the masked secrets.
Vahid Jahandideh +2 more
openalex +3 more sources
KERALA'S FOOD SECURITY STATUS—A PROBE [PDF]
AbstractThe Indian state of Kerala had attained international acclaim for its consistently higher level of human development comparable with that of many advanced countries even with a much lower per capita income. The present paper focuses on the food security concerns in the state, which produces less than a quarter of its food grain requirements ...
Reshmy Nair
openalex +2 more sources
Many current approach to access control assume all external access are dangerous. As a consequence they stop all communication and check for authorisation. We present an optimistic approach to provide security services in a network environment that do not interject the security services into the operational sequence, rather, the security services are ...
Pierre Rolin +2 more
openalex +2 more sources
Let’s Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries [PDF]
The wire probe-and-fault models are currently the most used models to provide arguments for side-channel and fault security. However, several practical attacks are not yet covered by these models. This work extends the wire fault model to include more advanced faults such as area faults and permanent faults.
Siemen Dhooghe, Svetla Nikova⋆
openalex +4 more sources
Security against probe-response attacks in collaborative intrusion detection [PDF]
Probe-response attacks are a new threat for collaborative intrusion detection systems. A probe is an attack which is deliberately crafted so that its target detects and reports it with a recognizable "fingerprint" in the report. The attacker then uses the collaborative infrastructure to learn the detector's location and defensive capabilities from this
Vitaly Shmatikov, Ming-Hsiu Wang
openalex +2 more sources

