期刊文献+
共找到571篇文章
< 1 2 29 >
每页显示 20 50 100
Side-Channel Attacks & Data Exfiltration Using Wall Outlet USB Power Adapters
1
作者 Andrew Masters Vijay K. Madisetti 《Journal of Information Security》 2024年第4期433-447,共15页
The number and creativity of side channel attacks have increased dramatically in recent years. Of particular interest are attacks leveraging power line communication to 1) gather information on power consumption from ... The number and creativity of side channel attacks have increased dramatically in recent years. Of particular interest are attacks leveraging power line communication to 1) gather information on power consumption from the victim and 2) exfiltrate data from compromised machines. Attack strategies of this nature on the greater power grid and building infrastructure levels have been shown to be a serious threat. This project further explores this concept of a novel attack vector by creating a new type of penetration testing tool: an USB power adapter capable of remote monitoring of device power consumption and communicating through powerline communications. 展开更多
关键词 CYBERSECURITY Side channel attack Power Line Communication Penetration Testing Hotplug attack Tool
下载PDF
Secure and efficient elliptic curve cryptography resists side-channel attacks 被引量:8
2
作者 Zhang Tao Fan Mingyu Zheng Xiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期660-665,共6页
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 展开更多
关键词 elliptic curve cryptography side channel attack simple power attack differential power attack refined power analysis zero-point power analysis.
下载PDF
Security Control for Uncertain Networked Control Systems under DoS Attacks and Fading Channels 被引量:1
3
作者 Chengzhen Gao Cheng Tan +1 位作者 Hongtao Sun Mingyue Xiang 《Journal of Beijing Institute of Technology》 EI CAS 2022年第4期422-430,共9页
This paper characterizes the joint effects of plant uncertainty,Denial-of-Service(DoS)attacks,and fading channel on the stabilization problem of networked control systems(NCSs).It is assumed that the controller remote... This paper characterizes the joint effects of plant uncertainty,Denial-of-Service(DoS)attacks,and fading channel on the stabilization problem of networked control systems(NCSs).It is assumed that the controller remotely controls the plant and the control input is transmitted over a fading channel.Meanwhile,considering the sustained attack cycle and frequency of DoS attacks are random,the packet-loss caused by DoS attacks is modelled by a Markov process.The sampled-data NCS is transformed into a stochastic form with Markov jump and uncertain parameter.Then,based on Lyapunov functional method,linear matrix inequality(LMI)-based sufficient conditions are presented to ensure the stability of uncertain NCSs.The main contribution of this article lies in the construction of NCSs based on DoS attacks into Markov jump system(MJS)and the joint consideration of fading channel and plant uncertainty. 展开更多
关键词 networked control systems Denial-of-Service(DoS)attacks UNCERTAINTY fading channels Markov jump system
下载PDF
Randomized MILP framework for Securing Virtual Machines from Malware Attacks
4
作者 R.Mangalagowri Revathi Venkataraman 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1565-1580,共16页
Cloud computing involves remote server deployments with public net-work infrastructures that allow clients to access computational resources.Virtual Machines(VMs)are supplied on requests and launched without interacti... Cloud computing involves remote server deployments with public net-work infrastructures that allow clients to access computational resources.Virtual Machines(VMs)are supplied on requests and launched without interactions from service providers.Intruders can target these servers and establish malicious con-nections on VMs for carrying out attacks on other clustered VMs.The existing system has issues with execution time and false-positive rates.Hence,the overall system performance is degraded considerably.The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target server beyond a certain point.Every request is passed from source to destination via one broadcast domain to confuse the opponent and avoid them from tracking the server’s position.Allocation of SECURITY Resources accepts a safety game in a simple format as input andfinds the best coverage vector for the opponent using a Stackelberg Equilibrium(SSE)technique.A Mixed Integer Linear Programming(MILP)framework is used in the algorithm.The VM challenge is reduced by afirewall-based controlling mechanism combining behavior-based detection and signature-based virus detection.The pro-posed method is focused on detecting malware attacks effectively and providing better security for the VMs.Finally,the experimental results indicate that the pro-posed security method is efficient.It consumes minimum execution time,better false positive rate,accuracy,and memory usage than the conventional approach. 展开更多
关键词 Virtualization technology security cross-VM channel attack VM-escape R-VM-MILP algorithm(randomized VM allocation of security resources) Mixed Integer Linear Programming(MILP) SSE strategy firewall-based monitoring method
下载PDF
An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud 被引量:3
5
作者 Chao Yang Yunfei Guo +2 位作者 Hongchao Hu Wenyan Liu Yawen Wang 《China Communications》 SCIE CSCD 2019年第4期151-171,共21页
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi... Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures. 展开更多
关键词 side-channel attacks information LEAKAGE virtual machine migration GENETIC algorithm
下载PDF
An Efficient Method against Side-Channel Attacks on ECC
6
作者 LIU Shuanggen HU Yupu XU Wensheng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1573-1576,共4页
Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequen... Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequence of bit-strings representing the scalar k, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behavior for the algorithm, and thus will make it secure against simple power analysis attacks (SPA). With other randomization techniques, the proposed countermeasures do not penalize the computation time. The proposed scheme is more efficient than MOEller's one, its cost being about 5% to 10% smaller than MOEller's one. 展开更多
关键词 side-channel attacks ECC scalar multiplication algorithm
下载PDF
Performance of Analysis Cognitive Radio with Cooperative Sensing under Malicious Attacks over Nakagami Faded Channels
7
作者 Hagar O. Shazly Asmaa Saafan +1 位作者 Hesham El Badawy Hadia M. El Hennawy 《Wireless Engineering and Technology》 2016年第2期67-74,共8页
The different realistic propagation channels are faced frequently the multipath fading environments. The main goal of this system design (cognitive radio network) is to improve the efficiency of spectrum access on a n... The different realistic propagation channels are faced frequently the multipath fading environments. The main goal of this system design (cognitive radio network) is to improve the efficiency of spectrum access on a non-interfering basis. This system achieves high utilization for the limited spectrum in order to fulfill needs for all users’ demands which are considered as a problem in wireless communications due to rapidly increasing in wireless applications and service. This system is exposed to attack due to the vulnerabilities existence in this system. So, the main outcome of this paper is to investigate the performance of the cooperative sensing in cognitive radio networks under malicious attacks over different channel impairments, and to illustrate the most suitable individual probability of detection  in real faded channel by using Nakagami model. This paper illustrates the effectiveness of the attacks and fading on the performance of spectrum sensing process. 展开更多
关键词 Cognitive Radio Cooperative Sensing Malicious attacks Nakagami Faded channels
下载PDF
Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks
8
作者 Nadia Mustaqim Ansari Rashid Hussain +1 位作者 Sheeraz Arif Syed Sajjad Hussain 《Computers, Materials & Continua》 SCIE EI 2022年第7期1861-1875,共15页
The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the informat... The security of Internet of Things(IoT)is a challenging task for researchers due to plethora of IoT networks.Side Channel Attacks(SCA)are one of the major concerns.The prime objective of SCA is to acquire the information by observing the power consumption,electromagnetic(EM)field,timing analysis,and acoustics of the device.Later,the attackers perform statistical functions to recover the key.Advanced Encryption Standard(AES)algorithm has proved to be a good security solution for constrained IoT devices.This paper implements a simulation model which is used to modify theAES algorithm using logicalmasking properties.This invariant of the AES algorithm hides the array of bits during substitution byte transformation of AES.This model is used against SCAand particularly Power Analysis Attacks(PAAs).Simulation model is designed on MATLAB simulator.Results will give better solution by hiding power profiles of the IoT devices against PAAs.In future,the lightweight AES algorithm with false key mechanisms and power reduction techniques such as wave dynamic differential logic(WDDL)will be used to safeguard IoT devices against side channel attacks by using Arduino and field programmable gate array(FPGA). 展开更多
关键词 Side channel attacks power analysis attacks network security MASKING advance encryption standard
下载PDF
Resistance against side channel attack for RSA cryptosystem
9
作者 祝力 谷大武 王超 《Journal of Shanghai University(English Edition)》 CAS 2008年第2期146-151,共6页
Based on the structure of the side channel attacks (SCAs) to RSA cryptosystem can resist the fault attack and combine with the randomization method for the message and secret exponent, a new implementation scheme of... Based on the structure of the side channel attacks (SCAs) to RSA cryptosystem can resist the fault attack and combine with the randomization method for the message and secret exponent, a new implementation scheme of CRT-based (the Chinese remained theorem) RSA is proposed. The proposed scheme can prevent simple power analysis (SPA), differential power analysis (DPA) and time attack, and is compatible with the existing RSA-CRT cryptosystem as well. In addition, an improvement for resisting fault attack is proposed, which can reduce extra computation time. 展开更多
关键词 RSA side channel attack (SCA) randomization method
下载PDF
基于多源数据聚合的神经网络侧信道攻击
10
作者 张润莲 潘兆轩 +2 位作者 李金林 武小年 韦永壮 《计算机研究与发展》 EI CSCD 北大核心 2024年第1期261-270,共10页
基于深度学习的侧信道攻击需要针对密码算法的每一个密钥字节建模并训练,数据采集和模型训练开销大.针对该问题,提出一种基于多源数据聚合的神经网络侧信道攻击方法.为筛选具有良好泛化效果的密钥字节泄露数据进行数据聚合,以AES-128算... 基于深度学习的侧信道攻击需要针对密码算法的每一个密钥字节建模并训练,数据采集和模型训练开销大.针对该问题,提出一种基于多源数据聚合的神经网络侧信道攻击方法.为筛选具有良好泛化效果的密钥字节泄露数据进行数据聚合,以AES-128算法为例,先基于16个密钥字节的泄露数据训练16个单密钥字节模型,分别实现对16个密钥字节的恢复;其次,设计一种打分机制评估各单密钥字节模型的泛化效果,通过得分排序筛选出对各密钥字节恢复效果最好的单密钥字节模型;最后,以筛选模型所对应的各密钥字节泄露数据集构建多源数据聚合模型进行训练,实现密钥恢复.实验测试结果表明,多源数据聚合模型具有良好的泛化效果,有效提高了密钥恢复的准确率和效率,降低了恢复密钥所需的能量迹数量,其在采集能量迹较少的情况下依然具有较好的攻击效果. 展开更多
关键词 侧信道攻击 神经网络 打分机制 数据聚合 数据标签
下载PDF
面向SIMD指令集的SM4算法比特切片优化
11
作者 王闯 丁滟 +1 位作者 黄辰林 宋连涛 《计算机研究与发展》 EI CSCD 北大核心 2024年第8期2097-2109,共13页
SM4算法是中国自主设计的商用分组密码算法,其加解密计算性能成为影响信息系统数据机密性保障的重要因素之一.现有SM4算法优化主要面向硬件设计和软件查表等方向展开研究,分别存在依赖特定硬件环境、效率低下且易遭受侧信道攻击等问题.... SM4算法是中国自主设计的商用分组密码算法,其加解密计算性能成为影响信息系统数据机密性保障的重要因素之一.现有SM4算法优化主要面向硬件设计和软件查表等方向展开研究,分别存在依赖特定硬件环境、效率低下且易遭受侧信道攻击等问题.比特切片技术通过对输入数据重组实现了并行化高效分组密码处理,可以抵御针对缓存的侧信道攻击.然而现有切片分组密码研究对硬件平台相关性强、处理器架构支持单一,并且并行化处理流水启动较慢,面向小规模数据的加解密操作难以充分发挥单指令多数据(single instruction multiple data,SIMD)等先进指令集的优势.针对上述问题,首先提出了一种跨平台的通用切片分组密码算法模型,支持面向不同的处理器指令字长提供一致化的通用数据切片方法.在此基础上,提出了一种面向SIMD指令集的细粒度切片并行处理SM4优化算法,通过细粒度明文切片重组与线性处理优化有效缩短算法启动时间.实验结果表明,相比通用SM4算法,优化的SM4比特切片算法加密速率最高可达438.0 MBps,加密每字节所需的时钟周期最快高达7.0 CPB(cycle/B),加密性能平均提升80.4%~430.3%. 展开更多
关键词 SM4算法 性能优化 比特切片 侧信道攻击 SIMD指令集
下载PDF
云存储抗边信道攻击的密文数据去重算法
12
作者 吴玲红 王葵 刘捷 《计算机仿真》 2024年第9期412-415,445,共5页
考虑云储存中密文数据相似性较高,导致去重难度过大的问题,提出一种基于执行机构的密文数据去重算法。构建密文动态平衡跳跃表,根据对动态平衡跳跃表的构建与描述,得到抗边信道攻击的密文数据动态叠加特点。基于密文动态平衡跳跃表构建... 考虑云储存中密文数据相似性较高,导致去重难度过大的问题,提出一种基于执行机构的密文数据去重算法。构建密文动态平衡跳跃表,根据对动态平衡跳跃表的构建与描述,得到抗边信道攻击的密文数据动态叠加特点。基于密文动态平衡跳跃表构建与更新结果,提出一种抗边信道攻击的数据去重框架,云储存提供商执行数据加密、数据标签查询以及数据去重三个过程。云端储存使用标签代表数据查询操作,一旦查询计数超过阈值,执行数据加密程序对该文件进行加密,并按照云储存服务商提供的执行命令对重叠密文进行去重。实验结果证明,所提方法对密文数据去重效果表现较佳,去重后云储存空间占用情况得到了明显改善。 展开更多
关键词 抗边信道攻击 云存储 密文数据去重 动态平衡跳跃表
下载PDF
温针灸联合西药治疗风寒袭络型周围性面瘫疗效观察及对面神经功能、表情肌弹性的影响
13
作者 龚杰 徐密密 +2 位作者 潘宁芳 潘亚英 柴晓萍 《新中医》 CAS 2024年第17期103-108,共6页
目的:观察温针灸联合西药治疗风寒袭络型周围性面瘫的疗效及对面神经功能和表情肌弹性的影响。方法:选取94例周围性面瘫患者,按随机数字表法分为观察组及对照组各47例。对照组予以西药治疗,观察组在对照组基础上实施温针灸治疗。2组疗... 目的:观察温针灸联合西药治疗风寒袭络型周围性面瘫的疗效及对面神经功能和表情肌弹性的影响。方法:选取94例周围性面瘫患者,按随机数字表法分为观察组及对照组各47例。对照组予以西药治疗,观察组在对照组基础上实施温针灸治疗。2组疗程均为2周。比较2组临床疗效,比较2组治疗前后中医证候评分、面肌表面肌电图指标值、面动脉血流动力学指标值[面动脉舒张末期流速(Vd)、收缩期峰值流速(Vs)、阻力指数(RI)]、表情肌弹性模量值、House-Brackmann(H-B)评分、面部残疾指数躯体功能评分(FDIS)的变化。结果:观察组临床疗效总有效率为95.74%,对照组为82.98%,2组临床疗效比较,差异有统计学意义(P<0.05)。治疗后,2组口角歪斜、面肌瘫痪、眼不能闭、鼻唇沟变浅、味觉减退、耳后疼痛中医证候评分均较治疗前下降(P<0.05),观察组上述6项评分均低于对照组(P<0.05)。治疗后,2组额肌、眼轮匝肌、口轮匝肌表面肌电信号潜伏期均较治疗前缩短,波幅均较治疗前增大,差异均有统计学意义(P<0.05);观察组上述3项表面肌电信号潜伏期均短于对照组,波幅均高于对照组,差异均有统计学意义(P<0.05)。治疗后,2组患侧面动脉Vd、Vs指标值均较治疗前升高,RI指标值均较治疗前下降,差异均有统计学意义(P<0.05);观察组Vd、Vs指标值均高于对照组(P<0.05),RI指标值低于对照组(P<0.05)。治疗后,2组额肌、降口角肌、降下唇肌弹性模量值均较治疗前增加(P<0.05),观察组上述3项弹性模量值均高于对照组(P<0.05)。治疗后,2组H-B评分均较治疗前下降,FDIS评分均较治疗前升高,差异均有统计学意义(P<0.05);观察组H-B评分低于对照组,FDIS评分高于对照组,差异均有统计学意义(P<0.05)。结论:温针灸联合西药治疗风寒袭络型周围性面瘫可改善血液循环和面神经功能,恢复表情肌弹性,缓解临床症状。 展开更多
关键词 周围性面瘫 风寒袭络型 温针灸 面神经 面肌 弹性模量值
下载PDF
一种基于模板的RSA-CRT模约减攻击方法
14
作者 马向亮 乌力吉 +3 位作者 王宏 张向民 黄克振 刘玉岭 《电子学报》 EI CAS CSCD 北大核心 2024年第3期689-695,共7页
目前针对RSA-CRT的建模类攻击研究较少,本文以模约减操作为研究对象,提出了一种针对RSA-CRT实现的模板攻击方法.该方法的核心是解决了如何由模约减后中间值的汉明重量恢复RSA-CRT私钥的难题.该方法的特点是基于模约减后中间值的汉明重... 目前针对RSA-CRT的建模类攻击研究较少,本文以模约减操作为研究对象,提出了一种针对RSA-CRT实现的模板攻击方法.该方法的核心是解决了如何由模约减后中间值的汉明重量恢复RSA-CRT私钥的难题.该方法的特点是基于模约减后中间值的汉明重量模型建模,通过采集选择密文模约减的能量迹进行模板匹配获取模约减后中间值的汉明重量,由汉明重量变化值恢复中间值,进一步恢复RSA-CRT算法的私钥.另外,该方法的优点在于理想情况下,基于中间值汉明重量模型建立的模板之间可以共用,且对中间值以多少位大小建模没有限制,可以选择字节大小,64位大小,甚至私钥p相同大小,实际环境中可根据泄露信息情况进行选取.最后,本文选择对中间值的最低字节进行建模,验证了该方法的可行性,并给出了防护建议. 展开更多
关键词 模板攻击 RSA-CRT 选择密文 模约减 侧信道攻击
下载PDF
处理器时间侧信道攻防技术综述
15
作者 唐博文 武成岗 王喆 《高技术通讯》 CAS 北大核心 2024年第5期439-452,共14页
现代处理器优化机制众多,设计人员在追求性能提升时,往往忽略背后的安全风险。时间侧信道攻击因其影响面广且隐蔽性好已成为最主要的安全威胁之一。随着瞬态执行攻击的出现,时间侧信道攻击的能力被进一步扩展,计算系统的安全基础被动摇... 现代处理器优化机制众多,设计人员在追求性能提升时,往往忽略背后的安全风险。时间侧信道攻击因其影响面广且隐蔽性好已成为最主要的安全威胁之一。随着瞬态执行攻击的出现,时间侧信道攻击的能力被进一步扩展,计算系统的安全基础被动摇。为此,处理器厂商及安全人员提出了大量防御机制。这些机制具有不同的防护能力及性能开销。与此同时,新的瞬态执行漏洞和隐蔽信道也不断被发现,已提出的防御机制被不断突破。围绕处理器时间侧信道攻防技术的博弈日益激烈。本文从基本攻击原理出发,对现有时间侧信道攻击进行了归纳总结,并在此基础上进一步分析了相关防御机制的保护能力和性能瓶颈,从而梳理出时间侧信道攻防技术的发展趋势,为未来软硬件系统开发和安全技术探索提供参考。 展开更多
关键词 处理器微架构 时间侧信道攻击 隐蔽信道 瞬态执行攻击 投机执行 防御技术
下载PDF
针对ZUC算法硬件实现的相关能量攻击与多粒度时域敏感区域检测
16
作者 吴一 赵昱霖 +5 位作者 潘雨洋 马哲 李彦昭 彭乾 乌力吉 张向民 《密码学报(中英文)》 CSCD 北大核心 2024年第3期637-648,共12页
本文通过合理分解模加操作,优化流水线结构,构建ZUC算法硬件实现,并基于FPGA开发板搭建ZUC算法功耗采集平台.构建粗细粒度时域敏感区域的泄漏检测方法,利用移动平均算子,发掘高信噪比风险区域,采用自相关滤波器与峰值检测算子,发掘具有... 本文通过合理分解模加操作,优化流水线结构,构建ZUC算法硬件实现,并基于FPGA开发板搭建ZUC算法功耗采集平台.构建粗细粒度时域敏感区域的泄漏检测方法,利用移动平均算子,发掘高信噪比风险区域,采用自相关滤波器与峰值检测算子,发掘具有明显重复特征的运算区间,并对泄漏高风险区域进行标定,实现高精度的泄漏风险定位.通过分析ZUC算法的脆弱性,本文提出一种基于选择初始向量IV的CPA攻击方案,对输入的IV信息进行选择,通过固定部分明文的方法有效提高采集信号的信噪比,并采集实际3000条功耗曲线,在算法初始化首轮,成功提取8 bit密钥信息,从而证明该方案的有效性,对ZUC算法的硬件实现进行侧信道防护是必要的.总结ZUC算法侧信道防护方案,对比方案优劣. 展开更多
关键词 ZUC 相关能量分析 侧信道攻击
下载PDF
NOMA场景下基于双阶段训练的导频污染攻击检测和去污方案
17
作者 彭薇 吴亚莹 +2 位作者 陈达 罗锴 王巍 《移动通信》 2024年第10期23-31,48,共10页
导频污染攻击是攻击者使用与合法用户一致的导频去破坏合法用户的导频训练过程,是物理层中一种主动窃听手段。针对于目前基于调整导频结构的导频污染攻击研究在实际场景中的应用效果较差以及信道去污缺乏对角度域重叠概率探究的问题,提... 导频污染攻击是攻击者使用与合法用户一致的导频去破坏合法用户的导频训练过程,是物理层中一种主动窃听手段。针对于目前基于调整导频结构的导频污染攻击研究在实际场景中的应用效果较差以及信道去污缺乏对角度域重叠概率探究的问题,提出可用于非正交多址接入环境的基于双阶段训练的导频污染攻击检测算法和基于空间特征的信道去污方案:首先利用接收信号在不同训练阶段正交投影结果的概率密度分布得到攻击检测结果;再利用信道能量在基站天线数较大时只会集中在少数几个方向上,并且不同用户信道在角度域上不可能存在重叠的理论依据实现信道去污。仿真实验表明,相较于基于随机矩阵理论的检测算法[10]和最小描述长度检测算法[11],提出的导频污染攻击检测方法在不同信噪比和导频长度下检测能力都得到显著改善;相较于基于特征值分解的盲信道估计算法[21]和线性最小均方误差信道估计算法[29],提出的信道去污方法在不同信噪比下去污性能上也得到了显著提升。 展开更多
关键词 物理层安全 导频污染攻击 NOMA 攻击检测 信道去污
下载PDF
针对IDEA加密算法的差分功耗攻击 被引量:1
18
作者 吴克寿 陈玉明 +1 位作者 李仁发 王晓栋 《计算机工程与应用》 CSCD 2012年第29期64-66,108,共4页
研究分析国际数据加密算法IDEA的特点,采用差分功耗分析攻击方式进行密钥破解,针对IDEA算法提出一种基于汉明距离的差分功耗攻击方法。该攻击方法是一种典型的加密芯片旁路攻击方式,其理论基础为集成电路中门电路在实现加密算法时的物... 研究分析国际数据加密算法IDEA的特点,采用差分功耗分析攻击方式进行密钥破解,针对IDEA算法提出一种基于汉明距离的差分功耗攻击方法。该攻击方法是一种典型的加密芯片旁路攻击方式,其理论基础为集成电路中门电路在实现加密算法时的物理特性、功耗模型及数据功耗相关性。详细介绍了针对IDEA加密系统进行差分功耗攻击的设计与实现,开发了相应的仿真实验平台,实验成功破解了IDEA加密算法的密钥,从而给IDEA加密算法研究者提供了有益的安全设计参考。实验表明,未加防护措施的IDEA加密系统难以抵御差分功耗的攻击。 展开更多
关键词 国际数据加密算法(idea) 差分功耗攻击 汉明距离 功耗模型 旁路攻击
下载PDF
uBlock算法的低延迟一阶门限实现方法
19
作者 姚富 陈华 范丽敏 《电子学报》 EI CAS CSCD 北大核心 2024年第4期1250-1259,共10页
目前已有文献给出了uBlock分组密码算法的侧信道防护方案,但是这些方案不仅延迟较高,难以适用于低延迟高吞吐场景,而且在毛刺探测模型下缺乏可证明安全性.针对这一问题,本文给出了在毛刺探测模型下具有可证明安全性的uBlock算法的低延... 目前已有文献给出了uBlock分组密码算法的侧信道防护方案,但是这些方案不仅延迟较高,难以适用于低延迟高吞吐场景,而且在毛刺探测模型下缺乏可证明安全性.针对这一问题,本文给出了在毛刺探测模型下具有可证明安全性的uBlock算法的低延迟门限实现方案.此外,我们引入了Changing of the Guards技术来避免防护方案在执行过程中需要额外随机数.对于防护方案的安全性,我们用自动化评估工具SILVER验证了S盒的毛刺探测安全性,并用泄露评估技术TVLA(Test Vector Leakage Assessment)验证了防护方案的整个电路的安全性.最后,我们用Design Compiler工具对防护方案的性能消耗情况进行了评估.评估结果显示,与序列化实现方式的uBlock防护方案相比,我们的防护方案的延迟能够减少约95%. 展开更多
关键词 密码芯片 uBlock算法 侧信道攻击与防护 掩码技术 门限实现 Changing of the Guards
下载PDF
癫痫共病抑郁的发病机制及中医治疗思路的研究进展
20
作者 李郝婧 马琳 +2 位作者 赵猛 李艳凤 刘征 《中国医药导报》 CAS 2024年第12期199-200,F0003,共3页
抑郁是癫痫患者常见的共病现象,无论是西医还是中医角度,癫痫和抑郁均有着共同的发病机制。西医学认为是免疫-神经-内分泌网络异常导致的癫痫共病抑郁,中医学则认为癫痫共病抑郁与中医藏象学说之肝、脑相关。藏象学说之下的肝、脑与西... 抑郁是癫痫患者常见的共病现象,无论是西医还是中医角度,癫痫和抑郁均有着共同的发病机制。西医学认为是免疫-神经-内分泌网络异常导致的癫痫共病抑郁,中医学则认为癫痫共病抑郁与中医藏象学说之肝、脑相关。藏象学说之下的肝、脑与西医之免疫-神经-内分泌网络系统有着密切联系。较西医而言,中医治疗有着多层次、多靶点、综合调节的优势,且西医对癫痫病灶的定位和各项生化指标及影像学检查,点明了中药和针灸在机体内的作用方向,为中医药的治疗本病带来了新思路,有利于对其治疗的进一步发展。 展开更多
关键词 中医 癫痫共病抑郁 发作机制 治疗思路 肝脑论治
下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部