|
|
|
Valentin Martinoli, Elouan Tourneur, Yannick Teglia and Régis Leveugle
In this work, we study an end-to-end implementation of a Prime + Probe covert channel on the CVA6 RISC-V processor implemented on a FPGA target and running a Linux OS. We develop the building blocks of the covert channel and provide a detailed view of it...
ver más
|
|
|
|
|
|
|
Huiyuan Wang, Xiaojun Wu, Zirui Wang, Yukun Hao, Chengpeng Hao, Xinyi He and Qiao Hu
Dolphin signals are effective carriers for underwater covert detection and communication. However, the environmental and cost constraints terribly limit the amount of data available in dolphin signal datasets are often limited. Meanwhile, due to the low ...
ver más
|
|
|
|
|
|
|
Hao Sun, Yuejin Du and Qi Li
Amid the incessant evolution of the Internet, an array of cybersecurity threats has surged at an unprecedented rate. A notable antagonist within this plethora of attacks is the SQL injection assault, a prevalent form of Internet attack that poses a signi...
ver más
|
|
|
|
|
|
|
Parisa Rahimi, Amit Kumar Singh and Xiaohang Wang
With increasing interest in multi-core systems, such as any communication systems, infra-structures can become targets for information leakages via covert channel communication. Covert channel attacks lead to leaking secret information and data. To desig...
ver más
|
|
|
|
|
|
|
S. V. Hayrapetyan,K.S. Zaytsev
Pág. 30 - 38
The purpose of this paper is to describe the developed method of detecting network covert timing channels, based on machine learning algorithms. Detection of network covert channels is an actual problem, since the latter can be used to leak confidential ...
ver más
|
|
|
|
|
|
|
Timur Karimov, Vyacheslav Rybin, Georgii Kolev, Ekaterina Rodionova and Denis Butusov
Communication systems based on chaotic synchronization are gaining interest in the area of secure and covert data transmission. In this paper, a novel digital communication technique based on a coherent chaotic data transmission approach is proposed. In ...
ver más
|
|
|
|
|
|
|
Lilian Bossuet and El Mehdi Benhani
Cache attacks are widespread on microprocessors and multi-processor system-on-chips but have not yet spread to heterogeneous systems-on-chip such as SoC-FPGA that are found in increasing numbers of applications on servers or in the cloud. This type of So...
ver más
|
|
|
|
|
|
|
Yabo Duan, Huaizhan Li, Suqin Wu and Kefei Zhang
Inertial navigation is a crucial part of vehicle navigation systems in complex and covert surroundings. To address the low accuracy of vehicle inertial navigation in multifaced and covert surroundings, in this study, we proposed an inertial navigation er...
ver más
|
|
|
|
|
|
|
Jia Shi, Xuewen Zeng and Yang Li
Standalone Name Resolution (SNR) is an essential component of many Information-Centric Networking (ICN) infrastructures that maps and stores the mappings of IDs and locators. The delivery of data can be realized only when the name resolution process is c...
ver más
|
|
|
|
|
|
|
Nisha Rawindaran, Ambikesh Jayal and Edmond Prakash
In many developed countries, the usage of artificial intelligence (AI) and machine learning (ML) has become important in paving the future path in how data is managed and secured in the small and medium enterprises (SMEs) sector. SMEs in these developed ...
ver más
|
|
|
|