No abstract available.
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines
Trusted computing platforms aim to provide trust in computations performed by sensitive applications. Verifying the integrity of memory contents is a crucial security service that these platforms must provide since an adversary able to corrupt the ...
Behavioural Characterization for Network Anomaly Detection
In this paper we propose a methodology for detecting abnormal traffic on the net, such as worm attacks, based on the observation of the behaviours of different elements at the network edges. In order to achieve this, we suggest a set of critical ...
The Power of Anonymous Veto in Public Discussion
The Dining Cryptographers problem studies how to securely compute the boolean-OR function while preserving the privacy of each input bit. Since its first introduction by Chaum in 1988, it has attracted a number of solutions over the past twenty years.
...
Collusion-Resistant Message Authentication in Overlay Multicast Communication
This paper aims at providing message authentication service in overlay multicast. Previous work has mostly focused on the network layer IP multicast and not as much work has been done on the application layer overlay multicast. A main feature of overlay ...
A Model for Authentication Credentials Translation in Service Oriented Architecture
Due to the increasing number of service providers, the grouping of these providers following the federation concept and the use of the Single Sign On (SSO) concept are helping users to gain a transparent access to resources, without worrying about their ...
Secure and Efficient Group Key Agreements for Cluster Based Networks
Ad hoc wireless networks offer anytime-anywhere networking services for infrastructure-free communication over the shared wireless medium. The proliferation of portable devices and ad hoc networks have led to the need for security services. This is ...
An Integrated ECC-MAC Based on RS Code
This paper presents a message authentication code (MAC) with error-correcting capabilities which can be used for wireless transmission. Also the paper introduces a new nonlinear mixing function `<em>Nmix</em> ' which is cryptographically strong compared ...
Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks
A vehicle can be tracked by monitoring the messages broadcast from it. The broadcast by a source contains its current identity and also allows estimation of its location by receivers. This mapping between the physical entity and the estimated location ...
Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools
Several advanced Role based access control (RBAC) models have been developed supporting specific features (i.e.: role hierarchy, separation of duty) to achieve high flexibility. However, integrating additional features also increases their design ...
Role Based Access Control with Spatiotemporal Context for Mobile Applications
Role based access control (RBAC) is an established paradigm in resource protection. However, with the proliferation of mobile computing, it is being frequently observed that the RBAC access decision is directly influenced by the spatiotemporal context ...
A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior
The aim is to propose a new approach for stochastic modeling of an intrusion process and quantitative evaluation of the probability of the attacker success. In many situations of security analysis, it is necessary to obtain the probabilities of success ...
A Hardware Architecture for Integrated-Security Services
There are numerous techniques, methods and tools to promote the security of a digital system, however, each day the mechanisms of attack evolve and are integrated, creating separate spheres of combined attacks. In this context, this paper presents an ...
Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology
- Francesco Regazzoni,
- Thomas Eisenbarth,
- Axel Poschmann,
- Johann Großschädl,
- Frank Gurkaynak,
- Marco Macchetti,
- Zeynep Toprak,
- Laura Pozzi,
- Christof Paar,
- Yusuf Leblebici,
- Paolo Ienne
This paper explores the resistance of MOS Current Mode Logic (MCML) against attacks based on the observation of the power consumption. Circuits implemented in MCML, in fact, have unique characteristics both in terms of power consumption and the ...
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection
- Jedidiah R. Crandall,
- John Brevik,
- Shaozhi Ye,
- Gary Wassermann,
- Daniela A. Oliveira,
- Zhendong Su,
- S. Felix Wu,
- Frederic T. Chong
Conventional approaches to either information flow security or intrusion detection are not suited to detecting Trojans that steal information such as credit card numbers using advanced cryptovirological and inference channel techniques. We propose a ...
Index Terms
- Transactions on Computational Science IV: Special Issue on Security in Computing