The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advancement of technology, the uses of Multi-UAV networks have been rising, especially in life-threatening tasks of disaster management and military operations. Multi-UAV networks face various security issues because of being a member of an Adhoc network family. There is a dire need to design a threat model that can identify threats, quantify risks involved and address them. In this paper,...
Large numbers of Internet of Things (IoT) devices are increasingly deployed in many aspects of modern life. Given their limited resources and computational power, verifying program integrity in such devices is a challenging issue. In this paper, we design MTRA, a Multiple-Tier Remote Attestation protocol, by exploiting differences in resources and computational power among various types of networked...
Since their inception, FPGAs have changed significantly in their capacity and architecture. The devices we use today are called upon to solve problems in mixed-signal, high-speed communications, signal processing and compute acceleration that early devices could not address. The devices continue to grow in capability and complexity. In order for designers to use them effectively, new tools are required...
Safety is a constant need that involves aspects such as integrity of moving objects and / or transport, such as lockers or bike. Therefore, in this paper the development of software applications based on image processing, which relieve traditional media such as padlocks and associated problems such as lost keys or forgotten passwords arises. In a timely recognition of faces in an embedded to derive...
Complex programmable logic device (CPLD) can be reconfigured to perform any desired application, the main theme of this paper was to reconfigure the CPLD which performs addition operation after detecting the given sequence for the choice of implementing security for the particular operation just like password protection. It mainly focused on designing an adder which performs its addition operation...
Code reuse attack (CRA) is a powerful exploitation technique that allows attackers to perform arbitrary computation. To maximize the performance, prior hardware solutions to CRAs require invasive modifications to the CPU architecture or substantial storage overhead to keep the binary analysis result. In this paper, we propose a new debug interface with which CRA solutions can be easily implemented...
The paper describes on-going work on a configurable network based experimental platform ReSeLa. The platform is a key component of the ongoing EU funded TEMPUS project ENGENSEC. The project is aiming at providing courses and training material to educate future generation of Cyber security experts. Our project is based on the educational Framework; Conceive, Design, Implement, Operate (CDIO1). The...
Hardware Trojan horses are a realistic threat for both ASIC and FPGA systems. Ring Oscillators (ROs) can be used to detect the presence of malicious hardware functionality. The length of an RO is a significant parameter for detecting efficiently malicious logic (sensitivity) while maintaining a low space and power profile. We explore through simulation the effect of the RO length on detecting different...
Cloud computing is the provision and delivery of computing resources as services over the Internet. The cloud computing business model also is a revolutionary change from what it had been as the service delivery and charge follows a utility model where customers are required to pay only for what is accessed and the duration of usage. Since the introduction of cloud computing to the market, service...
The Third International Workshop on Dependability of Clouds, Data Centers, and Virtual Machine Technology (DCDV 2013) features papers covering various aspects of dependability and security in Clouds and Data Centers. Four sessions covering Cloud and Data Center Networking, Dependability Evaluation, Mobile and Cloud Computing, and Virtualization and Cloud include eleven papers.
Security is emerging as an important concern in embedded system design. Security of an embedded system is compromised when software that can be trusted is resulting in unintended behaviour such as leakage of sensitive data and execution of spiteful code. Several counter measures have been proposed to counteract these sorts of intrusions. The general idea behind most of the methods is to define the...
The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution is to close the performance gap through hardware implementation of security functions. However, continuously expanding signature databases have become a major impediment to achieving scalable hardware based pattern matching. Additionally, evolutionary rule...
Rapid advances in integrated circuit (IC) development predicted by Moore's Law lead to increasingly complex, hard to verify IC designs. Design insiders or adversaries employed at untrusted locations can insert malicious Trojan circuits capable of launching attacks in hardware or supporting software-based attacks. In this paper, we provide a method for detecting Trojan circuit denial-of-service attacks...
One of the most efficient methods for cracking passwords is the one based on ldquorainbow tablesrdquo; those lookup tables are offering an almost optimal time-memory tradeoff in the process of recovering the plaintext password from a password hash generated by a cryptographic hash function. In this paper, we demonstrate the first known system, implemented in a state-of-the-art reconfigurable device...
In this paper, we propose a group-based trust model named F-PKI (Freely organized one level Public Key Infrastructure) in P2P system based on Trusted Computing (TC) technology which is used to enhance PC security by incorporating hardware platform. In this model, peers are organized freely by group, each of which is a one level PKI. Preliminary evaluation results show that the proposed model is realistic...
This paper investigates the hardware trust of a trusted computing platform. Initially, some prior researches are discussed. Based on these researches, we point out that hardware trust is the same important as the software trust in a trusted computing platform. Then, we introduce the notion of Hardware Integrity Measurement (HIM), which is similar to the software integrity measurement required by the...
Virtualization technology (VT) being an re-emerging technology is becoming a hot topic for recently years. It is a decoupling technique that separating system software from hardware platform, while making applications to run pervasively. Many academic institutes and research lab from industries has devoted great research efforts in various aspects. In 2007, Chinese Ministry of Science and Technology...
Security is a prime concern in the design of a wide variety of embedded systems and security processors. So the customer security devices such as smart cards and security processors are prone to attack and there are on going research to protect these devices from attackers who intend to extract key information from these devices. Also an active attacker can induce errors during computation and exploit...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.