Dissertations / Theses on the topic 'Attack by observation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 15 dissertations / theses for your research on the topic 'Attack by observation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Hurst, William. "Behavioural observation for critical infrastructure security support." Thesis, Liverpool John Moores University, 2014. http://researchonline.ljmu.ac.uk/4382/.
Full textChabrier, Thomas. "Arithmetic recodings for ECC cryptoprocessors with protections against side-channel attacks." Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00910879.
Full textLucas, Audrey. "Support logiciel robuste aux attaques passives et actives pour l'arithmétique de la cryptographie asymétrique sur des (très) petits coeurs de calcul." Thesis, Rennes 1, 2019. http://www.theses.fr/2019REN1S070.
Full textThis thesis deals with protection development and evaluation against fault attacks (FA) and side channel attacks (SCA) simultaneously. These protections have been developed for elliptic curves cryptography (ECC) and its main operation, the scalar multiplication (MS). Two protections have been proposed. The first is point verification (PV) checking that the current point is effectively on the curve, with a uniformization behavior. Thus, this new SM with PV is robust against some FAs and also SPA, since it is uniform. The second one is called counter iteration (IC). ICC protects the scalar against major FAs with a uniform behavior. Its overhead is very small. Our protections have been implemented on Cortex M0 microcontroller for Weiertrass and Montgomery curves and for different types of coordinates. The overhead is between 48 % and 62 %, in the worst case (when the PV is made at each SM iteration). This overhead is smaller than overhead of usual basic protections against SPA. A theorical activity simulator has also been developed. It reproduces the architecture of a simple 32-bit microcontroller. Theoric activity is modeled by the Hamming weigh variations of manipulated data during execution. Thanks to the simulator, the impact of operands is illustrated for arithmetic units. Moreover, SPA and DPA attacks were made for evaluating our protections. Our protections show some security improvements
Linge, Yanis. "Etudes cryptographiques et statistiques de signaux compromettants." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENM037/document.
Full textThe main subject of this manuscript is the Side Channel Attacks. These attacks investigate the variation of device emanations to retrieve a secret key. These emanations can be the power consumption, the electromagnetic radiation, etc. Most of the time, those attacks use statistical methods to examine the relationship between the emanations and some leakage models supposed by the attacker. Three main axis are developed here. First, we have implemented many side channel attacks on GPGPU using the API OpenCL. These implementations are more effective than the classical ones, so an attacker can exploit more data. Then, in order to provide a new side channel attack, we have suggested the use of a new dependency measurement proposed by Reshef et al., the MIC. The MIC is more advantageous than the mutual information, because its computation does not depend of a kernel choice nor a windows size. So, its use in side channel analysis is simple, even if the time complexity is large. Finally, we have introduced a new attack based on the join distribution of the input and the output of a cryptographic sub-function. If the distribution depends on the key used in the function, we can retrieve the secret key. This attack can be efficient even in presence of some countermeasures because it does not required the knowledge of both plain text or cipher text
Pelletier, Heather L. "An Exploration of the Relationship Between Vicarious Learning Experiences and Panic Attacks." University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1310070759.
Full textTaylor, Matthew H. "Defining a Model for Tool Consumption Rate on Asphalt Reclamation Machines." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1293.
Full textAlberdi, Ion. "Malicious trafic observation using a framework to parallelize and compose midpoint inspection devices." Thesis, Toulouse, INSA, 2010. http://www.theses.fr/2010ISAT0008/document.
Full textOur Ph.D states that given the magnitude of malicious behavior in the Internet, end-host software must be monitored. To limit the number of monitoring points, we propose to monitor the software from an interconnection point, i.e. a midpoint. We have designed for this purpose Luth, a tool to compose and parallelize a set of midpoint inspectors (MI) that implement mini IDS, IPS or firewall-s, while checking the correction and optimality of the resulting inspection tree, using a configuration language, its interpreter and associated algorithms. We then configure this tool to monitor some end-host software used to observe malicious traffic. First, we demonstrate why malware downloading honeypots must be monitored by designing an original attack. Then, we show how we configure Luth to block these attacks while accepting the intrusions emulated by the honeypot. In a second step, we use Luth to implement a sandbox that analyzes dynamically and as safely as wanted malware's network communications. We show how the information obtained by this analysis enables us to cluster the analyzed malware and therefore limit the number of malware to analyze manually. Finally, we show how we automatically generate signatures from this analysis to detect those malware from a midpoint device
Branlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.
Full textEdwards, Timothy Robin. "A prospective observational study to investigate the effect of prehospital airway management strategies on mortality and morbidity of patients who experience return of spontaneous circulation post cardiac arrest and are transferred directly to regional Heart Attack Centres by the Ambulance Service." Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/19508.
Full textLe, Bouder Hélène. "UN FORMALISME UNIFIANT LES ATTAQUES PHYSIQUES SUR CIRCUITS CRYTOGRAPHIQUES ET SON EXPLOITATION AFIN DE COMPARER ET RECHERCHER DE NOUVELLES ATTAQUES." Thesis, Saint-Etienne, EMSE, 2014. http://www.theses.fr/2014EMSE0759/document.
Full textThe main subject of this work is the physical cryptanalysis of blocks ciphers. Even if cryptographic algorithms are properly designed mathematically, they may be vulnerable to physical attacks. Physical attacks are mainly divided in two families: the side channel attacks which are based on the observation of the circuit behaviour during the computation, and the fault injection attacks which consist in disturbing the computation in order to alter the correct progress of the algorithm. These attacks are used to target the cipher key or to reverse engineer the algorithm. A formalism is proposed in order to describe the two families in a unified way. Unifying the different attacks under a same formalism allows to deal with them with common mathematical tools. Additionally, it allows a comparison between different attacks. Using this framework, a generic method to assess the vulnerabilities of generalized Feistel networks to differential fault analysis is presented. This work is furthermore extended to improve a FIRE attack on DES-like cryptosystems with customized s-boxes
Huang, Yuan-Chun, and 黃元俊. "Influence of India and Pakistan Terrorist Activities in South Asia Security: Observation Based on 2008 Mumbai Attack." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/87103454122238471674.
Full text國立臺灣師範大學
政治學研究所
99
In this study, 2008 Mumbai terrorist attack is the observation basis in order to explain the relation that between terrorist attacks and India-Pakistan conflict. All contents strive to explore "What are the impacts in the context of India-Pakistan conflict and terrorism development to the South Asia regional security?" This study used four research methods, they were literature review method, historical research methods, case study analysis and induction method. Purpose of this study is integrated exploring on the following items : First, the India-Pakistan conflict attributions and meanings under history development; Second, the impacts of India-Pakistan conflict’s to the South Asian regional security; Third, the impacts of India-Pakistan terrorist development to South Asia regional security; Fourth, making example about major terrorist attack, exploring the impacts of India-Pakistan relation; Fifth, India, Pakistan and international actions to the terrorism. This study found the following three points: First, solving the economic, social and political problem of uneven development in India and Pakistan are both urgent. Kashmir is the priority region. Second, India and Pakistan must to make greater effort to "inner force" and "external force" on anti-terrorism actions. Third, using the international powers (international organizations) to exert pressure in order to promote peaceful development between India and Pakistan, and the South Asia regional security stability as well.
DAN, YU-XUAN, and 但宇軒. "Audio-Based Observation Attacks Resistant PIN-Entry Schemes." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/g7mn5k.
Full text國立臺中教育大學
資訊工程學系
105
Common PIN-entry schemes are vulnerable to observation attacks, in which the adversary can obtain the user’s PIN by using shoulder-surfing attacks or camera recording attacks. Therefore, some observation attacks resistant PIN-entry schemes have been proposed. However, none of these observation attacks resistant PIN-entry schemes can achieve both sufficient security and high usability. To solve this problem, audios have been used by some observation attacks resistant PIN-entry schemes as secondary channels for sending secret information from the system to the user. In this thesis, we analyze the security and usability of three representative audio-based observation attacks resistant PIN-entry schemes for mobile devices, including Phone Lock, ColorLock, and LinA. However, as the user has to carry an earphone with him in existing audio-based observation attacks resistant PIN-entry schemes, the usability of existing audio-based observation attacks resistant PIN-entry schemes is not ideal. Thus, we propose a simple audio-based observation attacks resistant PIN-Entry scheme, Audio-PES (Audio PIN Entry Scheme), in which the device’s receiver is used by the system to covertly transmit secret information to the user at low volume so that earphones are not required. However, the usability of Audio-PES is still unsatisfactory for some high-efficiency applications. Thus, we propose another audio-based observation attacks resistant PIN-Entry scheme, O-Audio-PES (Overlapping Audio PIN Entry Scheme), in which earphones are also not required. By using the technique of overlapping the user’s responses, the login time can be reduced. On the other hand, in existing audio-based observation attacks resistant PIN-entry schemes, the transmission efficiency of secret information is insufficient. Therefore, we propose the third audio-based observation attacks resistant PIN-entry scheme, D-Audio-PES (Dual Tone Audio PIN Entry Scheme), in which earphones are also not required. By using the technology of dual tone, the usability can be improved. Finally, we compare the security and usability of the proposed three schemes and three existing representative schemes. The application developers can choose the audio-based observation attacks resistant PIN-entry scheme suitable for the application environments.
Xu, Hao-Jun, and 徐豪駿. "Observation Attacks Resistant PIN-Entry Schemes Based on Haptic Feedbacks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/rffp8w.
Full text國立臺中教育大學
資訊工程學系
104
Common PIN-entry schemes are vulnerable to observation attacks, in which the adversary can obtain the user’s PIN by using shoulder-surfing attacks or camera recording attacks. To enhance the resistance to observation attacks, some observation attacks resistant PIN-entry schemes have been proposed. However, none of existing observation attacks resistant PIN-entry schemes can achieve both good security and high usability. To solve this problem, haptics have been used as secondary channels for sending secret information from the system to the user. In this thesis, we analyze the security and usability of three representative observation attacks resistant PIN-entry schemes for mobile devices based on haptics, including Phone Lock, TimeLock, and VibraInput. However, in existing observation attacks resistant PIN-entry schemes based on haptics, the user cannot choose the efficiency-security setting suitable for him. Thererfore, we propose a flexible observation attacks resistant PIN-entry scheme, Flex-HapPIN, in which the user can choose the efficiency-security setting suitable for him. Howerver, the usability of FlexHapPIN is still unsatisfactory for some high-efficiency applications. Thus, we propose a rapid observation attacks resistant PIN-entry scheme, Rap-HapPIN, in which the user can efficiently log into the system. Recently, touchscreen devices providing localized haptic feedback have been designed, developed, and/or implemented. It is likely that touchscreen devices providing localized haptic feedback will be available for common users in the near future. Thererfore, we propose a new observation attacks resistant PIN-entry scheme, Loc-HapPIN, for touchscreen devices providing localized haptic feedback. By using the technology of localized haptic feedback, the usability and the resistance to observation attacks are improved. Furthermore, the user can also choose the efficiency-security setting suitable for him.
QIU, Pei-Jia, and 邱培嘉. "Observation Attacks Resistant Graphical Password Schemes Based on Number-Icon-Location." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/15092888377481448699.
Full text國立臺中教育大學
資訊工程學系
103
Common textual password schemes and graphical password schemes are vulnerable to observation attacks, in which the adversary can obtain the user's password information while users in the login process by using the shoulder-surfing attack and/or the hidden-camera attack. In 2002, Sobrado and Birget proposed three observation attacks resistant graphical password schemes. Since then, many graphical password schemes with different degrees of resistance to observation attacks have been proposed. However, none of these schemes can achieve both sufficient security and good usability. Herein, we propose an enhanced observation attacks resistant graphical password scheme, NIL, based on moving icons. This memory interference can be reduced by combining simple numbers, icons, and locations. We show that NIL can achieve both sufficient security and good usability for general environments. However, the average login time of NIL is still too long for high-efficiency environments. In addition, the resistance of NIL to observation attacks is insufficient for high threat environments. Therefore, we also propose a modified version of NIL, NILplus. By using earphones, NILplus can significantly decrease the average login time. In addition, the success probability of NILplus to observation attacks will remain extremely low even if the adversary has observed the user's login sessions many times. Furthermore, NILplus is also superior to the NIL with respect to the password space while the resistance of NILplus to accidental login roughly equals NIL.
LIN, CHANG-CHIH, and 林昌志. "Observation Attacks Resistant PIN Authentication Schemes Based on Combinations of Visual-Audio-Haptic Interfaces." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/58mzm6.
Full text國立臺中教育大學
資訊工程學系
107
Personal Identification Number (PIN) is a numeric password that can be used for user authentication. The major advantage of using PIN is low memory burden and low operation burden. In particular, PIN authentication usually will not cause the problems of privacy violation and non-replacement, which cannot be fully avoided in authentication methods based on biometrics. So far, PIN is still widely used in many application systems for authenticating users. However, since common PIN authentication schemes cannot resist observation attacks, in which the adversary can obtain the user’s PIN by using shoulder-surfing attacks and/or camera recording attacks, many observation attacks resistant PIN authentication schemes have been proposed. However, none of existing observation attacks resistant PIN authentication schemes can achieve both high security and good usability. To improve the resistance to observation attacks, we propose an earphones free audio based observation attacks resistant PIN authentication scheme — A-PAS, which uses a dual-tone mechanism to speed up the login process to improve usability, using mobile devices. Next, for environments with high security requirements, we propose another earphones free audio based observation attacks resistant PIN authentication scheme — A-PASPLUS, based on our improved dual-tone mechanism. Although the login time of A-PASPLUS may be slightly longer, its resistance to accidental login is strengthened. Furthermore, to reduce the user’s login time, we propose an earphones free visual-audio based observation attacks resistant PIN authentication scheme — VA-PAS, in which the mobile device’s receiver and touchscreen are used to speed up the user’s login process. However, VA-PAS is not suitable for noisy environments. Considering most current mobile devices provide multiple sensory interfaces and mechanisms, we propose an earphones free visual-audio-haptic based observation attacks resistant PIN authentication scheme — VAH-PAS, which uses the haptic feedback mechanism to reduce the possibility of leaking secret voice prompts in the situation that the mobile device’s receiver does not fit snugly to the user’s ear. Compared with VA-PAS, VAH-PAS is more suitable for noisy environments and for mild hearing-impaired users. Finally, we compare the proposed schemes with some existing representative observation attacks resistant PIN authentication schemes. The system designers and the users can choose the suitable observation attacks resistant PIN authentication schemes according to the security and usability requirements for their application environments.