A Survey on How Side-Channels Lead to Compromised Information Corentin Lavaud, Robin Gerzaguet, Matthieu Gautier, Olivier Berder, Erwan Nogues, Stephane Molton
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Power Communication Using Optical-Fiber
IPASJ International Journal of Electrical Engineering (IIJEE) Web Site: http://www.ipasj.org/IIJEE/IIJEE.htm A Publisher for Research Motivation........ Email: [email protected] Volume 3, Issue 12, December 2015 ISSN 2321-600X Power Communication using Optical-fiber Saurabh1 Varun Kumar2 1Modinagar, Ghaziabad 2Room N0.314 Ginni Hostel, KNGD Campus Modinagar, Ghaziabad ABSTRACT Power transmission is a very important tool in electrical engineering field. In power transmission it is very necessary to communicate from on location to another. For such communication it is generally desired to have a wired communication but that cost too high and also faces the problem of interference of power frequency of 50Hz /60Hz with communicating frequency of GHz. To win over this problem certain improvement in wired communication or else wireless communication can be chosen but wired communication is given priority over the wireless communication due to economic considerations and the complexity of the wireless communication. Also wireless communication use is prohibited in the radioactive zone of the nuclear plants. Here a brief detail on the power communication using Optical fiber will be presented. Keywords: optical -fiber, forward current, communication, power line 1. INTRODUCTION Power transmission and communication is the major field in electrical and electronics sectors where the work has been carried out simultaneously to improve the quality and cost effectiveness. When we talk about power we mean to convey the voltage and current of high magnitude. Since, the development and the work of the electronics, communication sector through the optical- fiber the world has seen a complete turnout. Today the data from the Pacific is send to Asia in very few seconds, this has been made possible due the presence of optical fiber cables in the Pacific Ocean and Indian Ocean. -
Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote
Cyber Threats to Mobile Phones Paul Ruggiero and Jon Foote Mobile Threats Are Increasing Smartphones, or mobile phones with advanced capabilities like those of personal computers (PCs), are appearing in more people’s pockets, purses, and briefcases. Smartphones’ popularity and relatively lax security have made them attractive targets for attackers. According to a report published earlier this year, smartphones recently outsold PCs for the first time, and attackers have been exploiting this expanding market by using old techniques along with new ones.1 One example is this year’s Valentine’s Day attack, in which attackers distributed a mobile picture- sharing application that secretly sent premium-rate text messages from the user’s mobile phone. One study found that, from 2009 to 2010, the number of new vulnerabilities in mobile operating systems jumped 42 percent.2 The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Smartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security. Technical security measures, such as firewalls, antivirus, and encryption, are uncommon on mobile phones, and mobile phone operating systems are not updated as frequently as those on personal computers.3 Mobile social networking applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many smartphone users do not recognize these security shortcomings. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers.4 Meanwhile, mobile phones are becoming more and more valuable as targets for attack. -
Review of Communication Technologies for Smart Homes/Building Applications
Accepted for presentation at the 2015 IEEE Innovative Smart Grid Technologies Conference (ISGT-ASIA). Bangkok, Thailand. November 4-6, 2015. 1 Review of Communication Technologies for Smart Homes/Building Applications M. Kuzlu, Senior Member, IEEE, M. Pipattanasomporn, Senior Member, IEEE, and S. Rahman, Fellow, IEEE 1Virginia Tech – Advanced Research Institute, Arlington, VA 22203 [email protected], [email protected] and [email protected] frequency. Therefore, communication requirements for CPN Abstract— A customer premises network (CPN) is a critical applications are typically low power consumption, low cost, element to support messaging exchange among smart meters, an simplicity, and secure communications. energy management unit, load controllers, smart appliances and Typical smart grid applications in a CPN, such as HEM, electric vehicles in a smart home/building environment. Smart metering, demand response, etc., are discussed in [3, 4, 5]. In grid applications in a CPN generally are driven by the need for [6], authors propose a comprehensive assessment of various Home/Building Energy Management Systems (HEM/BEM). communication technologies for CPNs and develop an Design of an effective energy management system requires the approach for selecting suitable technologies for demand selection of a proper communication technology. The objective of response applications. A contemporary look at the current state this paper is to compare commonly used wired and wireless of the art in smart grid communications and networking communication technologies for smart grid applications in a premises area network in terms of their standard/protocol, technologies as well as assess their suitability for deployment maximum data rate, coverage range, and adaptation rate. These to serve various smart grid applications are discussed in [7, 8]. -
Wireless Challenges and Signals
Outline 18-452/18-750 • Goals and structure of the course Wireless Networks and Applications • Administrative stuff Lecture 2: Wireless Challenges • A bit of history • Wireless technologies • Building a network Peter Steenkiste » Designing a BIG system Carnegie Mellon University » The OSI model » Packet-based communication » Challenges in Wireless Networking Spring Semester 2020 http://www.cs.cmu.edu/~prs/wirelessS20/ Peter A. Steenkiste, CMU 1 Peter A. Steenkiste, CMU 2 Why Use Wireless? What is Hard about Wireless? There are no wires! There are no wires! Has several significant advantages: • In wired networks links are constant, reliable and • Supports mobile users physically isolated » Move around office, campus, city, … - users get hooked » A 1 Gps Ethernet always has the same properties » Remote control devices (TV, garage door, ..) » Not true for “54 Mbs” 802.11a and definitely not for “6 Gbs” 802.11ac » Cordless phones, cell phones, .. » WiFi, GPRS, Bluetooth, … • In wireless networks links are variable, error- prone and share the ether with each other and • No need to install and maintain wires other external, uncontrolled sources » Reduces cost – important in offices, hotels, … » Link properties can be extremely dynamic » Simplifies deployment – important in homes, hotspots, … » For mobile devices they also differ across locations Peter A. Steenkiste, CMU 3 Peter A. Steenkiste, CMU 4 Page 1 Wireless is a shared medium Attenuation and Errors Bob Mary • In wired communication, Bob Mary signals are contained in a conductor • In -
Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers
Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers Zhihui Shao∗ Mohammad A. Islam∗† Shaolei Ren University of California, Riverside University of Texas at Arlington University of California, Riverside [email protected] [email protected] [email protected] ABSTRACT program’s usage pattern of CPU resources, if detected by another Attacks based on power analysis have been long existing and stud- program, can be modulated for information transfer between the ied, with some recent works focused on data exfiltration from victim two [50, 57]. Consequently, to mitigate data theft risks, enterprise systems without using conventional communications (e.g., WiFi). users commonly have restricted access to outside networks — all Nonetheless, prior works typically rely on intrusive direct power data transfer from and to the outside is tightly scrutinized. measurement, either by implanting meters in the power outlet or Nevertheless, such systems may still suffer from data exfiltration tapping into the power cable, thus jeopardizing the stealthiness of at- attacks that bypass the conventional communications protocols tacks. In this paper, we propose NoDE (Noise for Data Exfiltration), (e.g., WiFi) by transforming the affected computer into a transmitter a new system for stealthy data exfiltration from enterprise desk- and establishing a covert channel. For example, the transmitting top computers. Specifically, NoDE achieves data exfiltration over computer can modulate the intensity of the generated acoustic a building’s power network by exploiting high-frequency voltage noise by varying its cooling fan or hard disk spinning speed to ripples (i.e., switching noises) generated by power factor correction carry 1/0 bit information (e.g., a high fan noise represents “1” and circuits built into today’s computers. -
Image Steganography Applications for Secure Communication
IMAGE STEGANOGRAPHY APPLICATIONS FOR SECURE COMMUNICATION by Tayana Morkel Submitted in partial fulfillment of the requirements for the degree Master of Science (Computer Science) in the Faculty of Engineering, Built Environment and Information Technology University of Pretoria, Pretoria May 2012 © University of Pretoria Image Steganography Applications for Secure Communication by Tayana Morkel E-mail: [email protected] Abstract To securely communicate information between parties or locations is not an easy task considering the possible attacks or unintentional changes that can occur during communication. Encryption is often used to protect secret information from unauthorised access. Encryption, however, is not inconspicuous and the observable exchange of encrypted information between two parties can provide a potential attacker with information on the sender and receiver(s). The presence of encrypted information can also entice a potential attacker to launch an attack on the secure communication. This dissertation investigates and discusses the use of image steganography, a technology for hiding information in other information, to facilitate secure communication. Secure communication is divided into three categories: self-communication, one-to-one communication and one-to-many communication, depending on the number of receivers. In this dissertation, applications that make use of image steganography are implemented for each of the secure communication categories. For self-communication, image steganography is used to hide one-time passwords (OTPs) in images that are stored on a mobile device. For one-to-one communication, a decryptor program that forms part of an encryption protocol is embedded in an image using image steganography and for one-to-many communication, a secret message is divided into pieces and different pieces are embedded in different images. -
Eie312 Communications Principles
EIE312 COMMUNICATIONS PRINCIPLES Outline: Principles of communications: 1. An elementary account of the types of transmission (Analogue signal transmission and digital signal transmission). Block diagram of a communication system. 2. Brief Historical development on communications: a. Telegraph b. Telephony c. Radio d. Satellite e. Data f. Optical and mobile communications g. Facsimile 3. The frequency Spectrum 4. Signals and vectors, orthogonal functions. 5. Fourier series, Fourier integral, signal spectrum, convolution, power and energy correlation. 6. Modulation, reasons for modulation, types of modulation. 7. Amplitude modulation systems: a. Comparison of amplitude modulation systems. b. Methods of generating and detecting AM, DBS and SSB signals. c. Vestigial sideband d. Frequency mixing and multiplexing, frequency division multiplexing e. Applications of AM systems. 8. Frequency modulation systems: 1 a. Instantaneous frequency, frequency deviation, modulation index, Bessel coefficients, significant sideband criteria b. Bandwidth of a sinusoidally modulated FM signal, power of an FM signal, direct and indirect FM generation, c. Various methods of FM demodulation, discriminator, phase-lock loop, limiter, pre- emphasis and de-emphasis, Stereophonic FM broadcasting 9. Noise waveforms and characteristics. Thermal noise, shot noise, noise figure and noise temperature. Cascade network, experimental determination of noise figure. Effects of noise on AM and FM systems. 10. Block diagram of a superheterodyne AM radio receiver, AM broadcast mixer, local oscillator design, intermodulation interference, adjacent channel interference, ganging, tracking error, intermediate frequency, automatic gain control (AGC), delay AGC, diode detector, volume control. 11. FM broadcast band and specification, Image frequency, block diagram of a FM radio receiver, limiter and ratio detectors, automatic frequency control, squelch circuit, FM mono and FM stereo receivers. -
Espionage Against the United States by American Citizens 1947-2001
Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. -
Title 30 Wireless Telecommunications Facilities
Chapter 28 Wireless Telecommunications Facilities Section 10:28:1 Purpose Section 10:28:2 Authority Section 10:28:4 Enactment Section 10:28:5 Interpretation, Conflict, and Separability Section 10:28:6 Amendments Section 10:28:7 Purpose Section 10:28:8 Enforcement, violations, and Penalties Section 10:28:9 Definitions Section 10:28:10 Wireless Communications Facility Application Procedure & Approval Process Section 10:28:11 Wireless Communications Facility Performance Standards Section 10:28:12 Zoning Specific Wireless Communications Facility Performance Standards Section 10:28:13 Non-Commercial Wireless Facility (Amateur Radio Antenna) Standards Section 10:28:1 Purpose: A. To facilitate the provision of wireless telecommunication services to the residents and businesses of the Town of Apple Valley B. To minimize adverse visual effects of towers through careful design and sitting standards; C. To encourage the location of towers in non-residential areas through performance standards and incentives; D. To avoid potential damage to adjacent properties from tower failure through structural standards and setback requirements; and, E. To provide mechanisms for the mitigation of tower proliferation through tower sharing requirements for all new tower applicants and those existing towers that are physically capable of sharing. Section 10:28:2 Authority: The Planning Commission of the Town of Apple Valley (hereinafter "Planning Commission") is vested with the authority to review, approve, conditionally approve, and disapprove applications for wireless communication facilities, including sketch, preliminary, and final plans. 187 Section 10:28:3 Jurisdiction A. These regulations apply to all wireless communications facilities, as defined in Section 30:9, located within the corporate limits of the Town of Apple Valley or outside the corporate limits as provided by law. -
Image Steganography: Protection of Digital Properties Against Eavesdropping
Image Steganography: Protection of Digital Properties against Eavesdropping Ajay Kumar Shrestha Ramita Maharjan Rejina Basnet Computer and Electronics Engineering Computer and Electronics Engineering Computer and Electronics Engineering Kantipur Engineering College, TU Kantipur Engineering College, TU Kantipur Engineering College, TU Lalitpur, Nepal Lalitpur, Nepal Lalitpur, Nepal [email protected] [email protected] [email protected] Abstract—Steganography is the art of hiding the fact that Data encryption is basically a strategy to make the data communication is taking place, by hiding information in other unreadable, invisible or incomprehensible during transmission information. Different types of carrier file formats can be used, by scrambling the content of data. Steganography is the art but digital images are the most popular ones because of their and science of hiding information by embedding messages frequency on the internet. For hiding secret information in within seemingly harmless messages. It also refers to the images, there exists a large variety of steganography techniques. “Invisible” communication. The power of Steganography is in Some are more complex than others and all of them have hiding the secret message by obscurity, hiding its existence in respective strong and weak points. Many applications may a non-secret file. Steganography works by replacing bits of require absolute invisibility of the secret information. This paper useless or unused data in regular computer files. This hidden intends to give an overview of image steganography, it’s uses and information can be plaintext or ciphertext and even images. techniques, basically, to store the confidential information within images such as details of working strategy, secret missions, According to Bhattacharyya et al., “Steganography’s niche in criminal and confidential information in various organizations security is to supplement cryptography, not replace it. -
Comparative Analysis Between Wired and Wireless Technologies in Communications: a Review
International Journal Of Electrical, Electronics And Data Communication, ISSN: 2320-2084 Volume-5, Issue-5, May-2017 http://iraj.in COMPARATIVE ANALYSIS BETWEEN WIRED AND WIRELESS TECHNOLOGIES IN COMMUNICATIONS: A REVIEW 1 2 3 JAFARU IBRAHIM, TONGA AGADI DANLADI, MUSEFIU ADERINOLA 1,2,3Department of Electrical and Electronic Engineering, Hussaini Adamu Federal Polytechnic Kazaure, Jigawa State, Nigeria. E-mail: [email protected], [email protected], [email protected] Abstarct- Many telecommunications industry are looking for new ways to maximize their investment in communication networks while ensuring reliable and secure information transmission. There is a variety of communications medium solutions, the two most popularly in used were wireless technology and wired options, such as copper and fiber-optic cable. Wired network has proven its potential in the olden days but nowadays wireless communication has emerged as a robust, most efficient and preferred communication technique. Each of these types of communication medium has their advantages and disadvantages according to its technological characteristics. Wired and wireless networking has different hardware requirements, ranges, mobility, reliability and benefits. The aim of the paper is to compare both the Wired and Wireless medium on the basis of various parameters such as usability, Cost, efficiency, flexibility, coverage, Interference, Reliability, Mobility, Speed, Security etc. Keywords- Wired and Wireless, Speed, Security, coverage and interference. I. INTRODUCTION -
Some Words on Cryptanalysis of Stream Ciphers Maximov, Alexander
Some Words on Cryptanalysis of Stream Ciphers Maximov, Alexander 2006 Link to publication Citation for published version (APA): Maximov, A. (2006). Some Words on Cryptanalysis of Stream Ciphers. Department of Information Technology, Lund Univeristy. Total number of authors: 1 General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 Some Words on Cryptanalysis of Stream Ciphers Alexander Maximov Ph.D. Thesis, June 16, 2006 Alexander Maximov Department of Information Technology Lund University Box 118 S-221 00 Lund, Sweden e-mail: [email protected] http://www.it.lth.se/ ISBN: 91-7167-039-4 ISRN: LUTEDX/TEIT-06/1035-SE c Alexander Maximov, 2006 Abstract n the world of cryptography, stream ciphers are known as primitives used Ito ensure privacy over a communication channel.