The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Two major security challenges for integrated circuits (IC) that involve encryption cores are side-channel based attacks and malicious hardware insertions (trojans). Side-channel attacks predominantly use power supply measurements to exploit the correlation of power consumption with the underlying logic operations on an IC. Practical attacks have been demonstrated using power supply traces and either...
A common algorithm-level effective countermea-sure against side-channel attacks is random masking. However, second-order attack can break first-order masked devices by utilizing power values at two time points. Normally 2nd-order attacks require the exact temporal locations of the two leakage points. Without profiling, the attacker may only have an educated guessing window of size nw for each potential...
We propose a spatio-temporal rich model of motion vector planes as a part of a full steganalytic system against motion vector based steganography. Superior detection accuracy of the rich model over the previous methods has been lately demonstrated for digital images in both spatial and DCT domain. It has not been heretofore used for detection of motion vector steganography. We also introduced a transformation...
This study examined the hypothetical model of job security, job satisfaction, and perceived safety, as antecedences for driving behavior. Data collection from 360 motorcyclists, as survey respondent, in Jakarta, utilized purposive-sampling technique, with four instruments which reliabilities were calculated using Cronbach's Alpha. The goodness of fit and the validity of the Hypothetical model were...
Context-awareness in mobile information systems bears a huge potential. However, context-awareness is still in its infancy and its full potential is not yet exploited. One reason is the poorly supported creation and learning of suitable context descriptions. Another problem is the questionable predictive power of context descriptions that makes it difficult to correctly determine the current user...
We propose to use a method for divergence estimation between multi-dimensional distributions based on nearest neighbor distance (NND) for optimization of stegosystems (SG) and steganalysis. This approach has previously been effectively applied for the purposes of estimation and classification (particularly in the field of genetics). However, since divergence (precisely speaking, Kullback-Leibler divergence)...
Efforts to understand what goes on in the mind of an insider have taken a back seat to developing technical controls, yet insider threat incidents persist. We examine insider threat incidents with malicious intent and propose an explanation through a relationship between Dark Triad personality traits and the insider threat. Although Dark Triad personality traits have emerged in insider threat cases...
Online Social Networks exploit a lightweight process to identify their users so as to facilitate their fast adoption. However, such convenience comes at the price of making legitimate users subject to different threats created by fake accounts. Therefore, there is a crucial need to empower users with tools helping them in assigning a level of trust to whomever they interact with. To cope with this...
Image tampering is nowadays at everyone’s reach. This has determined an urgent need of tools capable of revealing such alterations. Unfortunately, while forgeries can be operated in many different ways, forensic tools usually focus on one specific kind of forgeries. Therefore, an effective strategy for tampering detection and localization requires to merge the output of many different forensic tools...
Recent results have shown that the compressed sensing (CS) framework can provide a form of data confidentiality when the signals are sensed by a fully random matrix. In this paper, we extend those results by considering the security achievable by partially circulant sensing matrices generated from a vector of random variables. Circulant matrices, having similar CS recovery performance as fully random...
In this paper, the problem of false information injection attack on the Kalman filter in dynamic systems is investigated. It is assumed that the Kalman filter system has no knowledge of the existence of the attacks. To be concrete, a target tracking system is used as an example in the paper. From the adversary’s point of view, the best attack strategies are obtained under different scenarios, including...
It is very challenging to secure industrial control systems from malwares and protect the system under control. Recent malwares have been specifically targeting public infrastructures like power grids/plants. Protecting against these malwares is challenging as they are configured with deep knowledge of the controller and system under control. Industrial plants are complex systems and hence needs a...
Implementing Physically Unclonable Functions (PUFs) on FPGAs is quite inefficient in terms of resource usage. Many logic and routing resources that could serve as entropy sources remain unused. We introduce a method that uses the partial reconfiguration ability of modern FPGAs as a way to maximize the entropy that can be extracted out of a logic block. Different implementations and types of PUFs can...
In this paper, we intend to hide multiuser data in a given host video stream with imperceptible spread-spectrum embedding. First, host video frames are picked in the original given video stream according to a frame selection pattern. We partition each host video frame into many small blocks. Based on a two-dimensional transformation of each small block and zigzag scanning, we construct the host video...
The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for cloud tenants or customers and introduces an additional layer that itself must be completely configured and secured. Intruders can exploit the large amount of cloud resources for their attacks. Most of the current security technologies do not provide the essential security features for cloud...
Advanced Persistent Threat (APT) poses a serious threat to cyber security, and its unique high unpredictability, deep concealment and grave harmfulness make the traditional network monitoring technology facing unprecedented challenges in the background of massive and complicated network traffic. This paper aimed for the urgent demand of APT network monitoring. Relying on the rapid development of big...
Link signature (LS) provides security to wireless devices by exploiting multipath characteristics, with an essential assumption that half-wavelength separation is sufficient to prevent nearby adversary sensors from effectively inferring the legitimate LS. However, such an assumption may be too optimistic; high channel correlation has been observed in real world experiments even when the spatial separation...
During recent years, establishing proper metrics for measuring system security has received increasing attention. Security logs contain vast amounts of information which are essential for creating many security metrics. Unfortunately, security logs are known to be very large, making their analysis a difficult task. Furthermore, recent security metrics research has focused on generic concepts, and...
Covert channels exploit network resources never intended for the purpose of communication in order to transfer messages undetectable by conventional security measures like intrusion detection systems and firewalls. Since covert communication provides a means to secretly transfer messages they pose a grave cyber security threat. Most research in detecting covert timing channels are focused on detecting...
Security & Dependability (SEC&DEP) monitoring has definitely become a number one priority, since it is understood that it is the pre-requisite for allowing system operation to continue also in the presence of faults and/or attacks. Since effective remediation requires that the right actions be taken at the right time, in order for SEC&DEP monitoring to be really useful, the results of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.