Sciweavers

Share
11 search results - page 1 / 3
» Process Table Covert Channels: Exploitation and Countermeasu...
Sort
View
CSFW
2007
IEEE
11 years 6 months ago
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework
Interrupt-driven communication with hardware devices can be exploited for establishing covert channels. In this article, we propose an information-theoretic framework for analyzin...
Heiko Mantel, Henning Sudbrock
CCS
2007
ACM
11 years 6 months ago
Detecting covert timing channels: an entropy-based approach
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the ...
Steven Gianvecchio, Haining Wang
DSN
2008
IEEE
11 years 6 months ago
TCP covert timing channels: Design and detection
Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
CHES
2004
Springer
216views Cryptology» more  CHES 2004»
11 years 3 months ago
Efficient Countermeasures against RPA, DPA, and SPA
In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel a...
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
11 years 3 months ago
Differential Power Analysis in the Presence of Hardware Countermeasures
Abstract. The silicon industry has lately been focusing on side channel attacks, that is attacks that exploit information that leaks from the physical devices. Although different c...
Christophe Clavier, Jean-Sébastien Coron, N...
books