期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
基于软件指令定位的新型高阶侧信道分析方法
1
作者 郭志鹏 唐明 +3 位作者 胡晓波 李煜光 彭国军 张焕国 《计算机学报》 EI CSCD 北大核心 2019年第5期929-941,共13页
现有的大多数高阶掩码方案都采用了软件实现方式,这样可以防止硬件电路毛刺产生的安全泄漏,同时不会受到硬件平台资源不足的限制.在目前针对高阶掩码方案的多种分析方法中,高阶侧信道分析是最有效的分析方法之一.即使是满足理论安全性... 现有的大多数高阶掩码方案都采用了软件实现方式,这样可以防止硬件电路毛刺产生的安全泄漏,同时不会受到硬件平台资源不足的限制.在目前针对高阶掩码方案的多种分析方法中,高阶侧信道分析是最有效的分析方法之一.即使是满足理论安全性的高阶掩码方案,高于理论安全阶数的高阶侧信道分析依然可以对其进行攻击.然而,当掩码方案的阶数很高时,由于高阶分析的时间复杂度和数据复杂度非常高,这使得高阶分析方法难以成功实施.在该文中,作者基于指令识别提出了一种特征点选取方法,称作指令定位特征点选择方法(Instruction Recognition-based Points of Interest Selection,IR-PoIS).通过定位与敏感信息相关的指令,IR-PoIS方法可以确定高阶掩码方案中每个秘密共享因子对应功耗出现的具体位置,从而降低后续高阶分析方法的时间复杂度.对于一个有n个秘密共享因子的高阶掩码方案,IR-PoIS方法可以将高阶分析方法的时间复杂度水平从功耗曲线点数的n次方降低到线性水平,大大提高了高阶分析方法的效率.并且由于目标CPU的指令集是已知的,攻击者可以事先对敏感指令进行建模.在SASEBO-W开发板上的实验中,作者对LDD指令进行了定位.实验结果表明,只需十条左右的功耗曲线,IR-PoIS的定位成功率就可以达到100%.这表明IR-PoIS方法是一种非常高效的特征点选择方法.在此基础上,该文成功地攻击了三阶Coron14掩码方案的软件实现,验证了基于IR-PoIS的高阶侧信道分析方法的有效性. 展开更多
关键词 侧信道分析 高阶分析 高阶掩码方案 指令识别 软件实现
在线阅读 下载PDF
A Dynamic Probabilistic Marking Approach with Multi-Tag for Tracing ICMP-Based DoS Attacks
2
作者 CHEN Xiuzhen MA Jin +2 位作者 LI Shenghong CHEN Ken SERHROUCHNI Ahmed 《Wuhan University Journal of Natural Sciences》 CAS 2013年第6期484-488,共5页
This paper presents a dynamic probabilistic marking algorithm with multiple routing address tags, which allows the vic- tim to traceback the origin of ICMP (Internet Control Message Pro- tocol)-based direct and refl... This paper presents a dynamic probabilistic marking algorithm with multiple routing address tags, which allows the vic- tim to traceback the origin of ICMP (Internet Control Message Pro- tocol)-based direct and reflective DoS attacks. The proposed ap- proach makes full use of scalable data space of ICMP packet to achieve multiple information tags. The difference between this pro- posal and previous proposals lies in two points. First, the number of packets needed by the victim to reconstruct the attack path is greatly reduced because of three key mechanisms: multi-tag, uniform left- over probability, and tag location choice based on the module of accommodated tag numbers within a packet. Second, the true origin of both direct and reflective ICMP-based DoS attacks can be traced. 展开更多
关键词 network security denial of service IP traceback dynamic probabilistic marking multi-tag
原文传递
Trajectory Based Routing in Large Scale Vehicular Ad hoc Networks
3
作者 Nedal Ababneh 《通讯和计算机(中英文版)》 2011年第10期867-876,共10页
关键词 网络路由 大型车辆 数据包转发 路由协议 Ad 弹道 基础设施 路由选择协议
在线阅读 下载PDF
A Distributed and Localized Topology Control Algorithm for Large-Scale Wireless Sensor Networks
4
作者 Nedal Ababneh 《通讯和计算机(中英文版)》 2010年第8期31-43,共13页
关键词 无线传感器网络 拥塞控制算法 拓扑结构 分布式 本地化 网络节点 节能技术 环境数据
在线阅读 下载PDF
Behavioral Modeling and Simulation of Cascade Multibit ΣΔ Modulator for Multistandard Radio Receiver
5
作者 Sonia Zouari Houda Daoud +2 位作者 Mourad Loulou Patrick Loumeau Nouri Masmoudi 《Circuits and Systems》 2013年第1期67-74,共8页
In this paper, a cascade Sigma-Delta (ΣΔ) Analog to Digital Converter (ADC) for multistandard radio receiver was presented. This converter is supposed to be able to support GSM, UMTS, Wifi and WiMAX communication st... In this paper, a cascade Sigma-Delta (ΣΔ) Analog to Digital Converter (ADC) for multistandard radio receiver was presented. This converter is supposed to be able to support GSM, UMTS, Wifi and WiMAX communication standards. The Sigma-Delta modulator makes use of 4 bit quantizer and Data-Weighted-Averaging (DWA) technique to attain high linearity over a wide bandwidth. A top-down design methodology was adopted to provide a reliable tool for the design of reconfigurable high-speed ΣΔMs. VHDL-AMS language was used to model the analog and mixed parts of the selected 2-1-1 cascade ΣΔ converter and to verify their reconfiguration parameters based on behavioural simulation. This multistandard architecture was high level sized to adapt the modulator performance to the different standards requirements. The effects of circuit non-idealities on the modulator performance were modeled and analyzed in VHDLAMS to extract the required circuit parameters. 展开更多
关键词 ΔΣ ADC MULTISTANDARD VHDL-AMS LANGUAGE BEHAVIOURAL Simulation
在线阅读 下载PDF
A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm
6
作者 LiangPang Xiao Chen +1 位作者 Zhi Xue Rida Khatoun 《国际计算机前沿大会会议论文集》 2017年第2期46-48,共3页
In wireless networks, jamming attacks are easy to launch and can significantly impact the network performance. The technique which localizes the jamming attacker is useful to address this problem. Some range-based loc... In wireless networks, jamming attacks are easy to launch and can significantly impact the network performance. The technique which localizes the jamming attacker is useful to address this problem. Some range-based localization schemes depend on the additional hardware of wireless nodes too much, and they can not work in resource-constrained wireless networks. Solutions in range-free localization are being pursued as a cost-effective alternative to more expensive range-based approaches.In this paper, we propose a novel range-free algorithm to localize the source of the attacker. We show that our approach only relies on the positions of each jammed or no-jammed node in the network, PSO algorithm is used to get the minimum covering circle of jammed positions and the circle center is the estimated jammer location. We compare our work with some existing range-free solutions via extensive simulations in two models, which are wireless sensor network (WSN) and vehicular ad hoc network (VANET) respectively. The experimental results suggest that our proposed algorithm achieves higher accuracy than the other solutions, and the localization error goes down with larger number of recorded jammed positions. In additional, when the recorded jammed positions are distributed in a specific constrained area, the localization error goes higher, we also propose an improved PSO algorithm to deal with this issue. 展开更多
关键词 Jamming attack JAMMER LOCALIZATION Vehicular ad HOC NETWORK (VANET) Wireless sensor NETWORK (WSN) PSO Minimum covering circle
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部