Malicious Off-chip Leakage Enabled by Side-channels
|
|
|
- Madeleine James
- 9 years ago
- Views:
Transcription
1 MOLES: Malicious Off-chip Leakage Enabled by Side-channels Lang Lin* Wayne Burleson* Christof Paar* # *University of Massachusetts Amherst, USA # Ruhr University Bochum, Germany ICCAD, November 2009 This work is supported by NSF Grants ,
2 MOLES: Malicious Off-chip Leakage Enabled by Side-channels Lang Lin* Wayne Burleson* Christof Paar* # *University of Massachusetts Amherst, USA # Ruhr University Bochum, Germany ICCAD, November 2009 This work is supported by NSF Grants ,
3 Our recent related research Power analysis attack in deep-submicron circuits: Leakage-Based Differential Power Analysis (LDPA) on Sub-90nm CMOS Cryptosystems, by L. Lin and W. Burleson, In IEEE International Symposium on Circuits and Systems (ISCAS), May Process variation impacts on power analysis attacks: Analysis and Mitigation of Process Variation Impacts on Power-Attack Tolerance, by L. Lin and W. Burleson, In Proceedings of ACM/IEEE Design Automation Conference (DAC), July The concept and FPGA implementation of Trojan sidechannels: Trojan side-channels: lightweight hardware Trojans through side-channel engineering, by L. Lin, M. Kasper, T. Guneysu, C. Paar and W. Burleson, In Workshop on Cryptographic p Hardware and Embedded Systems (CHES), September
4 What are/is MOLES? In the spy world, moles are double agents In this work, MOLES is Malicious Off-chip Leakage Enabled by Side-channels A novel class of hardware Trojans to intentionally leak secret information Hidden communication channel 4
5 High performance microchip supply, Defense Science Board, 2005; The hunt for the kill switch, IEEE Spectrum, 45-5, pp ,
6 Threat Model Design Company Design deliverables Untrusted Foundry Insider Attacker Compromised IC Evaluator The secret key is Attacker IC deployment Parties: Insider Attacker: implant MOLES Evaluator: IC test lab (Common Criteria ) Attacker: extract the secret information 6
7 Challenges in Hiding Mission of the insider attacker: to hide the implanted Trojans to evade the evaluators! Where to hide on a chip? How to trigger? How large is the implementation? How to evade various post-silicon validations? Layout inspection Function tests Security evaluation tests 7
8 MOLES Uses Side-channels Inherent side-channels of IC: electromagnetic radiation, power consumption, path delay We engineer a side-channel to convey secret information Analog signals: no violation to the functions Hard to test by traditional methods Unique exploitability: attackers control the design MOLES circuitry Key bus X0 X1 8
9 Challenges in Detection REQUIREMENT: Only attackers can detect, while evaluators cannot! 1. Detection under low information leakage signal-to-noise power ratio (SNR) Noise power at the global power grid (esp. non-crypto circuits) Process variation Attackers can amplify SNR by performing many measurements of the side-channel leakage. 2. Unique exploitability Attackers can modulate (encrypt) the side-channel leakage by pseudo-random sequences. 9
10 Spread-Spectrum Techniques Advantages: 1. Spread the side-channel leakage over a long time for hiding 2. Only the attackers gain knowledge of the modulation 3. Can leak multi-bit key simultaneously by code division x 5 x 9 x K r K6 r 6 K r K4 4 K 2 r K2 K 0 r K0 r K7 r K5 r K3 r K1 K 7 K 5 K 3 K 1 An experimental MOLES circuit using CDMA methods: 20-degree Linear Feedback Shift Register to leak 8-bit secret keys through capacitive loads 10
11 Design Spaces How many key bits to leak? Attackers often leak partial secret key bits to reduce the key searching space How big is the load capacitance? How to implement the Pseudo-Random Number Generator (initial state, feedback loop)? How to model the noise power? What type of side-channels for a generic MOLES? Power, but can be electromagnetic or timing side-channels 11
12 Design Flow Determine design g spaces p Design g of MOLES circuit SPICE MOLES implantation Power Trace generation Design of crypto circuit NO Key extraction by tt k? attackers? YES! YES! Detection by evaluators? NO Design done! SNR calibration Design Verification Determine the noise model Simulated measurement power (SMP) profile MATLAB 12
13 MOLES Works! Implementation: AES substitution box compromised by a MOLES circuit leaking 8-bit key Device model: 45nm predictive technology model Number of power traces analyzed VS. differential power (DP) Solid lines: correct key guesses; Dash lines: wrong key guesses RPT (required number of power traces) -20dB SNR with additive Gaussian white noise model RPT 13
14 Properties of MOLES Usually larger than RPT to extract all key bits Key value impacts ---- very weak Noise power impacts on RPT ---- near inverse-linear dependence on SNR (in db) x x 10 key key01 key10 key11 RPT SNR (db) 14
15 Conclusion and Future Work CONTRIBUTION: demonstration of MOLES for the first time MOLES can leak multi-bit secret information Attackers can uniquely exploit MOLES Constructive uses in the future! Enhancing the chip testability Post-silicon validation Built-In Self-Test (BIST) Cryptography applications IC fingerprinting, PUF Crypto primitives 15
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Hardware Trojans Detection Methods Julien FRANCQ
DEFENDING WORLD SECURITY Hardware Trojans Detection Methods Julien FRANCQ 2013, December the 12th Outline c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 2 /
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
Microsemi Security Center of Excellence
Microsemi Security Center of Excellence Sales and FAE Training August 24, 2015 1 Outline What is the Security Center of Excellence (SCoE)? Overview of Microsemi s Security capabilities and expertise Threat
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag
Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag Thomas Korak Thomas Plos Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology,
CHASE Survey on 6 Most Important Topics in Hardware Security
University of Connecticut CHASE Survey on 6 Most Important Topics in Hardware Security Prepared By Prof. M. Tehranipoor Charles H. Knapp Associate Professor in Engineering Innovation Topics! Counterfeit
Horst Görtz Institute for IT-Security
Horst Görtz Institute for IT-Security On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo
On Security Evaluation Testing
On Security Evaluation Testing Kerstin Lemke-Rust Hochschule Bonn-Rhein-Sieg Workshop: Provable Security against Physical Attacks Lorentz Center, 19 Feb 2010 Kerstin Lemke-Rust (H BRS) On Security Evaluation
Understanding Integrated Circuit Security Threats. Asif Iqbal Senior Program Manager, Apple Inc. SDM 11
Understanding Integrated Circuit Security Threats Asif Iqbal Senior Program Manager, Apple Inc. SDM 11 Outline Vulnerability at different layers and relative impact Some Cases and Proof of Concepts Integrated
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks HoonJae Lee 1, ManKi Ahn 2, SeonGan Lim 3, and SangJae Moon 4 1 Dongseo University, Busan, 617-716, Korea [email protected]
Introduction to Digital System Design
Introduction to Digital System Design Chapter 1 1 Outline 1. Why Digital? 2. Device Technologies 3. System Representation 4. Abstraction 5. Development Tasks 6. Development Flow Chapter 1 2 1. Why Digital
Spike-Based Sensing and Processing: What are spikes good for? John G. Harris Electrical and Computer Engineering Dept
Spike-Based Sensing and Processing: What are spikes good for? John G. Harris Electrical and Computer Engineering Dept ONR NEURO-SILICON WORKSHOP, AUG 1-2, 2006 Take Home Messages Introduce integrate-and-fire
Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks
Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks Tsz Hon Yuen - Huawei, Singapore Ye Zhang - Pennsylvania State University, USA Siu Ming
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Reviving smart card analysis
Reviving smart card analysis Christopher Tarnovsky Karsten Nohl [email protected] [email protected] Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for
AC 2010-969: DEVELOPING AN INDUSTRY-DRIVEN GRADUATE CERTIFICATE IN TEST ENGINEERING FOR ELECTRICAL ENGINEERING TECHNOLOGISTS
AC 2010-969: DEVELOPING AN INDUSTRY-DRIVEN GRADUATE CERTIFICATE IN TEST ENGINEERING FOR ELECTRICAL ENGINEERING TECHNOLOGISTS Nasser Alaraje, Michigan Technological University Dr. Alaraje s research interests
IC-EMC Simulation of Electromagnetic Compatibility of Integrated Circuits
IC-EMC Simulation of Electromagnetic Compatibility of Integrated Circuits SUMMARY CONTENTS 1. CONTEXT 2. TECHNOLOGY TRENDS 3. MOTIVATION 4. WHAT IS IC-EMC 5. SUPPORTED STANDARD 6. EXAMPLES CONTEXT - WHY
VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
How To Perform Differential Frequency Analysis (Dfa) On A Powerline (Aes) On An Iphone Or Ipad (Ase) On Microsoft Powerline 2 (Aces) On Pc Or Ipa (Aas)
A New Frequency-Based Side Channel Attack for Embedded Systems by Chin Chi Tiu A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied
Pervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
Efficient Interconnect Design with Novel Repeater Insertion for Low Power Applications
Efficient Interconnect Design with Novel Repeater Insertion for Low Power Applications TRIPTI SHARMA, K. G. SHARMA, B. P. SINGH, NEHA ARORA Electronics & Communication Department MITS Deemed University,
Memristor-Based Reactance-Less Oscillator
Memristor-Based Reactance-Less Oscillator M. Affan Zidan, Hesham Omran, A. G. Radwan and K. N. Salama In this letter, the first reactance-less oscillator is introduced. By using memristor, the oscillator
Harmonics and Noise in Photovoltaic (PV) Inverter and the Mitigation Strategies
Soonwook Hong, Ph. D. Michael Zuercher Martinson Harmonics and Noise in Photovoltaic (PV) Inverter and the Mitigation Strategies 1. Introduction PV inverters use semiconductor devices to transform the
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
TRUE SINGLE PHASE CLOCKING BASED FLIP-FLOP DESIGN
TRUE SINGLE PHASE CLOCKING BASED FLIP-FLOP DESIGN USING DIFFERENT FOUNDRIES Priyanka Sharma 1 and Rajesh Mehra 2 1 ME student, Department of E.C.E, NITTTR, Chandigarh, India 2 Associate Professor, Department
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
White Paper Utilizing Leveling Techniques in DDR3 SDRAM Memory Interfaces
White Paper Introduction The DDR3 SDRAM memory architectures support higher bandwidths with bus rates of 600 Mbps to 1.6 Gbps (300 to 800 MHz), 1.5V operation for lower power, and higher densities of 2
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
ESP-CV Custom Design Formal Equivalence Checking Based on Symbolic Simulation
Datasheet -CV Custom Design Formal Equivalence Checking Based on Symbolic Simulation Overview -CV is an equivalence checker for full custom designs. It enables efficient comparison of a reference design
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
The Reduced Address Space (RAS) for Application Memory Authentication
The Reduced Address Space (RAS) for Application Memory Authentication David Champagne, Reouven Elbaz and Ruby B. Lee Princeton University, USA Introduction Background: TPM, XOM, AEGIS, SP, SecureBlue want
Adversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
My Funding Provided By: Special Thanks: Dr. Zhizhang Chen. Cryptography Research Inc
My Funding Provided By: Special Thanks: Dr. Zhizhang Chen Cryptography Research Inc The Way Forward What is Side Channel Analysis (SCA) Your First Attack! Waveform Acquisition Magnetic Field Probe Amplifiers/Front-End
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
Breakthrough silicon scanning discovers backdoor in military chip (DRAFT of 05 March 2012)
Breakthrough silicon scanning discovers backdoor in military chip (DRAFT of 05 March 2012) Sergei Skorobogatov University of Cambridge Cambridge, UK [email protected] Christopher Woods Quo Vadis Labs London,
Testing of Digital System-on- Chip (SoC)
Testing of Digital System-on- Chip (SoC) 1 Outline of the Talk Introduction to system-on-chip (SoC) design Approaches to SoC design SoC test requirements and challenges Core test wrapper P1500 core test
Digital vs. Analog Volume Controls
Digital vs. Analog Volume Controls October 2011 AMM ESS 10/11 Summary of this Presentation In a Digital Audio System what is the trade-off between using a digital or an analog volume control? To answer
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
Application of Physical Attacks
Application of Physical Attacks to Real World Systems Workshop Provable Security against Physical Attacks Lorentz Center, Leiden February 17, 2010 Christof Paar Timo Kasper Embedded Security Group Horst
StarRC Custom: Next-Generation Modeling and Extraction Solution for Custom IC Designs
White Paper StarRC Custom: Next-Generation Modeling and Extraction Solution for Custom IC Designs May 2010 Krishnakumar Sundaresan Principal Engineer and CAE Manager, Synopsys Inc Executive Summary IC
Current vs. Voltage Feedback Amplifiers
Current vs. ltage Feedback Amplifiers One question continuously troubles the analog design engineer: Which amplifier topology is better for my application, current feedback or voltage feedback? In most
NATIONAL SUN YAT-SEN UNIVERSITY
NATIONAL SUN YAT-SEN UNIVERSITY Department of Electrical Engineering (Master s Degree, Doctoral Program Course, International Master's Program in Electric Power Engineering) Course Structure Course Structures
MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
Lightweight Cryptography From an Engineers Perspective
Lightweight Cryptography From an Engineers Perspective ECC 2007 Acknowledgement Christof Paar A. Bogdanov, L. Knudsen, G. Leander, M. Robshaw, Y. Seurin, C. Vikkelsoe S. Kumar 2 Outline Motivation Hardware
Timing Errors and Jitter
Timing Errors and Jitter Background Mike Story In a sampled (digital) system, samples have to be accurate in level and time. The digital system uses the two bits of information the signal was this big
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
McPAT: An Integrated Power, Area, and Timing Modeling Framework for Multicore and Manycore Architectures
McPAT: An Integrated Power, Area, and Timing Modeling Framework for Multicore and Manycore Architectures Sheng Li, Junh Ho Ahn, Richard Strong, Jay B. Brockman, Dean M Tullsen, Norman Jouppi MICRO 2009
FREQUENCY RESPONSE ANALYZERS
FREQUENCY RESPONSE ANALYZERS Dynamic Response Analyzers Servo analyzers When you need to stabilize feedback loops to measure hardware characteristics to measure system response BAFCO, INC. 717 Mearns Road
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Steganography in OFDM Symbols of Fast IEEE 802.11n Networks
2013 IEEE Security and Privacy Workshops Steganography in OFDM Symbols of Fast IEEE 802.11n Networks Szymon Grabski, Krzysztof Szczypiorski Institute of Telecommunications Warsaw University of Technology
Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions
Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance
Secure application programming in the presence of side channel attacks. Marc Witteman & Harko Robroch Riscure 04/09/08 Session Code: RR-203
Secure application programming in the presence of side channel attacks Marc Witteman & Harko Robroch Riscure 04/09/08 Session Code: RR-203 Attacks in the field Survey 2007*, Hong Kong: Asia-Pacific Pay-TV
Cybersecurity in a Quantum World: will we be ready?
Cybersecurity in a Quantum World: will we be ready? Michele Mosca University Research Chair 3 April 2015 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental
W a d i a D i g i t a l
Wadia Decoding Computer Overview A Definition What is a Decoding Computer? The Wadia Decoding Computer is a small form factor digital-to-analog converter with digital pre-amplifier capabilities. It is
USB 3.0* Radio Frequency Interference Impact on 2.4 GHz Wireless Devices
USB 3.0* Radio Frequency Interference Impact on 2.4 GHz Wireless Devices White Paper April 2012 Document: 327216-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
'Possibilities and Limitations in Software Defined Radio Design.
'Possibilities and Limitations in Software Defined Radio Design. or Die Eierlegende Wollmilchsau Peter E. Chadwick Chairman, ETSI ERM_TG30, co-ordinated by ETSI ERM_RM Software Defined Radio or the answer
A New Programmable RF System for System-on-Chip Applications
Vol. 6, o., April, 011 A ew Programmable RF System for System-on-Chip Applications Jee-Youl Ryu 1, Sung-Woo Kim 1, Jung-Hun Lee 1, Seung-Hun Park 1, and Deock-Ho Ha 1 1 Dept. of Information and Communications
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
AMS Verification at SoC Level: A practical approach for using VAMS vs SPICE views
AMS Verification at SoC Level: A practical approach for using VAMS vs SPICE views Nitin Pant, Gautham Harinarayan, Manmohan Rana Accellera Systems Initiative 1 Agenda Need for SoC AMS Verification Mixed
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Body Area Network Security: Robust Secret Sharing
Body Area Network Security: Robust Secret Sharing Sang-Yoon Chang, Yih-Chun Hu, Hans Anderson, Ting Fu, Evelyn Huang University of Illinois Body Area Network Background Body area network (BAN) consists
Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment
Side Channel Attacks on Smartphones and Embedded Devices using Standard Radio Equipment Gabriel Goller 1 and Georg Sigl 2 1 Giesecke & Devrient, Munich, Germany [email protected] 2 Technische Universität
DDX 7000 & 8003. Digital Partial Discharge Detectors FEATURES APPLICATIONS
DDX 7000 & 8003 Digital Partial Discharge Detectors The HAEFELY HIPOTRONICS DDX Digital Partial Discharge Detector offers the high accuracy and flexibility of digital technology, plus the real-time display
Product Overview. DSL Xpert Advantages. Flexible Configuration Options. User-Friendly PC-Controlled GUI. Testing of ADSL, ADSL2 and ADSL2+
Product Overview The DSL Xpert multi-layer analyzer (patent pending) breaks new ground as the only non-intrusive performance analysis solution for ADSL2+, ADSL2 and ADSL products. DSL Xpert is a modular
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
RF Measurements Using a Modular Digitizer
RF Measurements Using a Modular Digitizer Modern modular digitizers, like the Spectrum M4i series PCIe digitizers, offer greater bandwidth and higher resolution at any given bandwidth than ever before.
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Architectural Level Power Consumption of Network on Chip. Presenter: YUAN Zheng
Architectural Level Power Consumption of Network Presenter: YUAN Zheng Why Architectural Low Power Design? High-speed and large volume communication among different parts on a chip Problem: Power consumption
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Phase coherency of CDMA caller location processing based on TCXO frequency reference with intermittent GPS correction
Phase coherency of CDMA caller location processing based on TCXO frequency reference with intermittent GPS correction Dingchen Lu, Alfredo Lopez, Surendran K. Shanmugam, John Nielsen and Gerard Lachapelle
Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras
Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
An On-chip Security Monitoring Solution For System Clock For Low Cost Devices
An On-chip Security Monitoring Solution For System Clock For Low Cost Devices Frank Vater Innovations for High Performance Microelectronics Im Technologiepark 25 15236 Frankfurt (Oder), Germany [email protected]
Yier Jin RESEARCH INTERESTS
Yier Jin Department of Electrical Engineering and Computer Science University of Central Florida, Orlando, FL 32816 Phone: (407) 823-5321 (Office), (203) 859-1202 (Mobile) Fax: (407) 823-5483 Email: [email protected]
Side Channels: Hardware or Software threat?
Side Channels: Hardware or Software threat? Job de Haas Riscure Who am I Job de Haas Principal Security Analyst at Riscure Testing security on: Set-top-boxes, mobile phones, smart cards, payment terminals,
Hardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
b 1 is the most significant bit (MSB) The MSB is the bit that has the most (largest) influence on the analog output
CMOS Analog IC Design - Chapter 10 Page 10.0-5 BLOCK DIAGRAM OF A DIGITAL-ANALOG CONVERTER b 1 is the most significant bit (MSB) The MSB is the bit that has the most (largest) influence on the analog output
Experimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
Physical Security: Status and Outlook
Physical Security: Status and Outlook ECRYPT II: Crypto for 2020 January 22-24, Tenerife, Spain Stefan Tillich Ideal World P C 2 Real World P C, C,errC 3 Implementation Attacks First publication ~ 16 years
Curriculum and Concept Module Development in RF Engineering
Introduction Curriculum and Concept Module Development in RF Engineering The increasing number of applications students see that require wireless and other tetherless network solutions has resulted in
