Results 1 to 10 of about 3,209,774 (327)

On the spectral features of robust probing security

open access: greenTransactions on Cryptographic Hardware and Embedded Systems, 2020
In this work we provide a spectral formalization of non-interference in the presence of glitches. Our goal is to present new theoretical and practical tools to reason about robust-d-probing security.
Maria Chiara Molteni, Vittorio Zaccaria
doaj   +7 more sources

Random Probing Security with Precomputation

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems
At Eurocrypt 2014, Duc, Dziembowski and Faust proposed the random probing model to bridge the gap between the probing model proposed at Crypto 2003 and the noisy model proposed at Eurocrypt 2013.
Bohan Wang   +3 more
doaj   +5 more sources

Probing Security through Input-Output Separation and Revisited Quasilinear Masking

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2021
The probing security model is widely used to formally prove the security of masking schemes. Whenever a masked implementation can be proven secure in this model with a reasonable leakage rate, it is also provably secure in a realistic leakage model known
Dahmun Goudarzi   +3 more
doaj   +4 more sources

ADD-based Spectral Analysis of Probing Security

open access: green2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2022
In this paper, we introduce a novel exact verification methodology for non-interference properties of cryptographic circuits. The methodology exploits the Algebraic Decision Diagram representation of the Walsh spectrum to overcome the potential slow down associated with its exact verification against non-interference constraints.
Maria Chiara Molteni   +2 more
semanticscholar   +5 more sources

Hybrid epidemics--a case study on computer worm conficker. [PDF]

open access: yesPLoS ONE, 2015
Conficker is a computer worm that erupted on the Internet in 2008. It is unique in combining three different spreading strategies: local probing, neighbourhood probing, and global probing.
Changwang Zhang   +2 more
doaj   +5 more sources

Concrete Evaluation of the Random Probing Security [PDF]

open access: green, 2020
We study masked implementation's security when an adversary randomly probes each of its internal variables, intending to recover non-trivial knowledge about its secrets. We introduce a novel metric called Secret Recovery Probability (SRP) for assessing the informativeness of the probing leakages about the masked secrets.
Vahid Jahandideh   +2 more
openalex   +3 more sources

KERALA'S FOOD SECURITY STATUS—A PROBE [PDF]

open access: bronzeJournal of International Development, 2013
AbstractThe Indian state of Kerala had attained international acclaim for its consistently higher level of human development comparable with that of many advanced countries even with a much lower per capita income. The present paper focuses on the food security concerns in the state, which produces less than a quarter of its food grain requirements ...
Reshmy Nair
openalex   +2 more sources

Network security probe [PDF]

open access: goldProceedings of the 2nd ACM Conference on Computer and communications security - CCS '94, 1994
Many current approach to access control assume all external access are dangerous. As a consequence they stop all communication and check for authorisation. We present an optimistic approach to provide security services in a network environment that do not interject the security services into the operational sequence, rather, the security services are ...
Pierre Rolin   +2 more
openalex   +2 more sources

Let’s Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries [PDF]

open access: green, 2021
The wire probe-and-fault models are currently the most used models to provide arguments for side-channel and fault security. However, several practical attacks are not yet covered by these models. This work extends the wire fault model to include more advanced faults such as area faults and permanent faults.
Siemen Dhooghe, Svetla Nikova⋆
openalex   +4 more sources

Security against probe-response attacks in collaborative intrusion detection [PDF]

open access: goldProceedings of the 2007 workshop on Large scale attack defense, 2007
Probe-response attacks are a new threat for collaborative intrusion detection systems. A probe is an attack which is deliberately crafted so that its target detects and reports it with a recognizable "fingerprint" in the report. The attacker then uses the collaborative infrastructure to learn the detector's location and defensive capabilities from this
Vitaly Shmatikov, Ming-Hsiu Wang
openalex   +2 more sources

Home - About - Disclaimer - Privacy