Academic literature on the topic 'Spectre attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Spectre attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Spectre attack":

1

Xiong, Wenjie, and Jakub Szefer. "Survey of Transient Execution Attacks and Their Mitigations." ACM Computing Surveys 54, no. 3 (June 2021): 1–36. http://dx.doi.org/10.1145/3442479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Transient execution attacks, also known as speculative execution attacks, have drawn much interest in the last few years as they can cause critical data leakage. Since the first disclosure of Spectre and Meltdown attacks in January 2018, a number of new transient execution attack types have been demonstrated targeting different processors. A transient execution attack consists of two main components: transient execution itself and a covert channel that is used to actually exfiltrate the information.Transient execution is a result of the fundamental features of modern processors that are designed to boost performance and efficiency, while covert channels are unintended information leakage channels that result from temporal and spatial sharing of the micro-architectural components. Given the severity of the transient execution attacks, they have motivated computer architects in both industry and academia to rethink the design of the processors and to propose hardware defenses. To help understand the transient execution attacks, this survey summarizes the phases of the attacks and the security boundaries across which the information is leaked in different attacks.This survey further analyzes the causes of transient execution as well as the different types of covert channels and presents a taxonomy of the attacks based on the causes and types. This survey in addition presents metrics for comparing different aspects of the transient execution attacks and uses them to evaluate the feasibility of the different attacks. This survey especially considers both existing attacks and potential new attacks suggested by our analysis. This survey finishes by discussing different mitigations that have so far been proposed at the micro-architecture level and discusses their benefits and limitations.
2

Coates, Oliver. "The Threat of Aerial Bombing in World War Two Lagos, 1938–1943." Journal of African Military History 4, no. 1-2 (October 26, 2020): 66–96. http://dx.doi.org/10.1163/24680966-bja10002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract The spectre of air bombing attacks on West African cities during World War Two remains an unexplored dimension of World War Two history. Lagos had long been perceived as vulnerable to attack from neighbouring Dahomey (Benin), and the Fall of France in June 1940 intensified these threats, while increasing anxiety concerning potential Axis raids. Focusing on air-raid planning in Lagos particularly, this article will argue that the possibility of aerial bombing exposed not simply the incapacity of the colonial government and officials’ limited understanding of housing and employment in 1940s Lagos, but also the inadequacy of measures to protect African lives. Conversely, the air-raid threat motivated Africans to critique limited government provision and propose their own interpretations of this new and deadly threat. Although the feared aerial raids never materialised, the crisis and anxiety they provoked yield significant insights into wartime Nigeria, local participation in civil defence, and African responses to World War Two more generally.
3

Kelkar, Madhu. "Sanitizing Heritage—Hydraulic Water Supply and the Erosion of the Traditional Water Management System in Colonial Bombay City (1860–1947)." Journal of Heritage Management 4, no. 2 (December 2019): 123–40. http://dx.doi.org/10.1177/2455929619877014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The traditional urban water management systems of Bombay (Mumbai) city consisted of tanks and wells constructed by charitable people of all creeds. But the entry of hydraulic engineering techniques, via the construction of Vihar Lake in 1860, ostensibly to supply pure and plentiful water heralded their doom. The modern but intrinsically flawed water supply system, unplanned urban development and the ensuing insanitation aggravated cholera and malaria epidemics, endemic to the city, threatening its imperial trade. This, and the desire to create sanitized colonies through town planning, encouraged Bombay municipality to attack the city’s tanks and wells, vilified as sources of pollution, despite protests of the local people. Based on an examination of archival sources, this article traces the history of colonial Bombay’s water management policy from 1860 and examines its impact on the city’s water inheritance, up to Indian independence in 1947. It aims to raise awareness levels about the potential importance of the surviving heritage, at a time when the spectre of insanitation and water scarcity haunts Mumbai.
4

Strohmaier, Paul. "Heilsfiktionen." Romanistisches Jahrbuch 71, no. 1 (November 18, 2020): 169–203. http://dx.doi.org/10.1515/roja-2020-0005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractEven in a century so commonly associated with the stage as the French siècle classique, the theatre’s social, political and religious acceptance as a cultural practice remains highly contested. Hence, the recourse to the seemingly obsolete dramatic genre of the martyr tragedy that both Corneille (Polyeucte, Théodore) and Rotrou (Le véritable Saint Genest) take in the 1640 s must be understood as an attempt to secure a possible alliance between Christian devotion and the stage. Rather than effecting a reconciliation between the two, however, all three plays in question, in their attempt to adapt the martyr play to the emergent aesthetics of bienséance and vraisemblance, point to the irredeemable discrepancy of religion and the theatre instead, arousing doubts about the authenticity of conversion and potentially undermining the credibility of martyrdom itself. Small wonder then that the scathing Jansenist critique of the theatre, launched most forcefully by Pierre Nicole, takes this attempt to renew the martyr play as its point of attack. Yet, a closer examination of this polemic reveals that the seemingly stable ground of Christian faith finds itself haunted by the spectre of simulation.
5

Kocher, Paul, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, et al. "Spectre attacks." Communications of the ACM 63, no. 7 (June 18, 2020): 93–101. http://dx.doi.org/10.1145/3399742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Göder, R., G. Fritzer, A. Kapsokalyvas, P. Kropp, U. Niederberger, H. Strenge, WD Gerber, and JB Aldenhoff. "Polysomnographic Findings in Nights Preceding a Migraine Attack." Cephalalgia 21, no. 1 (February 2001): 31–37. http://dx.doi.org/10.1046/j.1468-2982.2001.00141.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Sleep recordings were performed in eight patients to analyse sleep alterations preceding migraine attacks. Polysomnographic recordings from nights before an attack were compared with nights without following migraine. We analysed standard sleep parameters and electroencephalogram (EEG) power spectra. The main findings preceding migraine attacks were a significant decrease in the number of arousals, a decrease in rapid eye movement (REM) density, a significant decrease of beta power in the slow wave sleep, and a decrease of alpha power during the first REM period. The results suggest a decrease in cortical activation during sleep preceding migraine attacks. According to the models of sleep regulation, alterations in the function of aminergic or cholinergic brainstem nuclei have to be discussed.
7

Schoenfeld, N., R. Mamet, I. Dotan, M. Sztern, Y. Levo, and D. Aderka. "Relation between Uroporphyrin Excretion, Acute Attacks of Hereditary Coproporphyria and Successful Treatment with Haem Arginate." Clinical Science 88, no. 3 (March 1, 1995): 365–69. http://dx.doi.org/10.1042/cs0880365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
1. The increased urinary excretion of porphyrins as well as of their precursors was studied in a patient with hereditary coproporphyria during two acute attacks in which symptoms differed markedly in character and severity. 2. The increase in urinary coproporphyrin was similar in the ‘mild’ and in the ‘severe’ attack, indicating a lack of correlation between coproporphyrin level and clinical symptoms. 3. Aminolaevulinic acid, porphobilinogen and uroporphyrin exhibited significantly higher values during the ‘severe’ attack than during the ‘mild’ attack. During the severe attack these three compounds were increased 18-, 14- and 46-fold, respectively, compared with increases of 3-, 3- and 8-fold, respectively, during the mild attack. 4. The striking rise in the formation of uroporphyrin was reflected in the plasma porphyrin profile, which revealed predominance of uroporphyrin. In accordance with this finding, an increase in erythrocyte porphobilinogen deaminase of 130% was recorded. 5. The fluorescence emission spectra of saline-diluted plasma (excitation of 405 nm) showed a distinct peak at 618 nm during the ‘severe’ episode and a small peak during the ‘mild’ attack, pointing to the possibility of diagnosing an attack simply by following the fluorometric screen of plasma. 6. The ‘severe’ attack of coproporphyria was treated with daily infusions of haem arginate, 3 mg/kg, every day for 4 days, at the end of which period a dramatic clinical response was observed. The relief of symptoms was found to be clearly related to the moderate decrease in uroporphyrin excretion observed rather than to the steep decline in the precursors.
8

Lal, Sheeba, Saeed Ur Rehman, Jamal Hussain Shah, Talha Meraj, Hafiz Tayyab Rauf, Robertas Damaševičius, Mazin Abed Mohammed, and Karrar Hameed Abdulkareem. "Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition." Sensors 21, no. 11 (June 7, 2021): 3922. http://dx.doi.org/10.3390/s21113922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Due to the rapid growth in artificial intelligence (AI) and deep learning (DL) approaches, the security and robustness of the deployed algorithms need to be guaranteed. The security susceptibility of the DL algorithms to adversarial examples has been widely acknowledged. The artificially created examples will lead to different instances negatively identified by the DL models that are humanly considered benign. Practical application in actual physical scenarios with adversarial threats shows their features. Thus, adversarial attacks and defense, including machine learning and its reliability, have drawn growing interest and, in recent years, has been a hot topic of research. We introduce a framework that provides a defensive model against the adversarial speckle-noise attack, the adversarial training, and a feature fusion strategy, which preserves the classification with correct labelling. We evaluate and analyze the adversarial attacks and defenses on the retinal fundus images for the Diabetic Retinopathy recognition problem, which is considered a state-of-the-art endeavor. Results obtained on the retinal fundus images, which are prone to adversarial attacks, are 99% accurate and prove that the proposed defensive model is robust.
9

Mohamed, Shaimaa, Amr Ghoneim, and Aliaa Youssif. "Visible/Infrared face spoofing detection using texture descriptors." MATEC Web of Conferences 292 (2019): 04006. http://dx.doi.org/10.1051/matecconf/201929204006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With extensive applications of face recognition technologies, face anti-spoofing played an important role and has drawn a great attention in the security systems. This study represents a multi-spectral face anti-spoofing method working with both visible (VIS) and near-infrared (NIR) spectra imaging. Spectral imaging is the capture of images in multiple bands. Since these attacks are carried out at the sensor, operating in the visible range, a sensor operating in another band can give more cues regarding the artifact or disguise used to carry out the attack. Our experimental results of public datasets proved that the proposed algorithms gain promising results for different testing scenarios and that our methods can deal with different illuminations and both photo and screen spoofing.
10

Swamy, R. Kumara, and R. Hemavathi. "Spectro-temporal features for audio replay attack detection." International Journal of High Performance Computing and Networking 16, no. 2/3 (2020): 170. http://dx.doi.org/10.1504/ijhpcn.2020.10034823.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Spectre attack":

1

Harris, Rae. "Spectre: Attack and Defense." Scholarship @ Claremont, 2019. https://scholarship.claremont.edu/scripps_theses/1384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Modern processors use architecture like caches, branch predictors, and speculative execution in order to maximize computation throughput. For instance, recently accessed memory can be stored in a cache so that subsequent accesses take less time. Unfortunately microarchitecture-based side channel attacks can utilize this cache property to enable unauthorized memory accesses. The Spectre attack is a recent example of this attack. The Spectre attack is particularly dangerous because the vulnerabilities that it exploits are found in microprocessors used in billions of current systems. It involves the attacker inducing a victim’s process to speculatively execute code with a malicious input and store the recently accessed memory into the cache. This paper describes the previous microarchitecture side channel attacks. It then describes the three variants of the Spectre attack. It describes and evaluates proposed defenses against Spectre.
2

Borg, Isak. "Speculative Interference: A Modern Spectre Attack." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-450199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Since the Spectre family of attacks were made public knowledge in January of 2018, researchers, manufacturers and interested individuals have experimented a lot with creating defences against it. But there have also been a lot of research aimed at circumventing these defences and finding alternative side-channels and mechanisms for performing Spectre-type attacks. This thesis implements and demonstrates a proof of concept of one of these newfound attacks known as a Speculative interference attack. This is done in a simulated environment, which to our knowledge has not been done before at the time of writing this report. After the 'basic' version of a Spectre attack has been explained, the thesis will explain how the more advanced interference attack works and how it is implemented in the simulated environment. In the end the results gained with the attack will be presented, which should convince the reader of the relevance and possibilities of the attack.
Efter att säkerhetsattackerna kända som Spectre offentliggjordes i Januari 2018 har bådeforskare, utvecklare och intresserade individer experimenterat med att ta fram försvar mot dem. Det har också spenderats mycket resurser och tid på att finna sätt att kringgå dessa försvar och att hitta alternativa sido-kanaler och mekanismer som kan utnyttjas för att genomföra en Spectre-attack. Den här uppsatsen demonstrerar en fungerande implementation av en av dessa nyfunna attacker, känd som en ’Speculative interference attack’. Detta görs i en simulerad miljö, vilken enligt vår kännedom inte tidigare har gjorts vid genomförandet av detta arbete. Efter att en mer grundläggande version av en Spectre-attack har förklarats kommer uppsatsen att gå igenom hur den mer avancerade ’interference’ attacken fungerar och hur den är implementerad. I slutändan kommer de resultat attacken tagit fram att redogöras, vilket bör övertyga läsaren om attackens relevans och möjligheter.
3

Bowen, Lucy R. "The Performance Cost of Security." DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/2002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Historically, performance has been the most important feature when optimizing computer hardware. Modern processors are so highly optimized that every cycle of computation time matters. However, this practice of optimizing for performance at all costs has been called into question by new microarchitectural attacks, e.g. Meltdown and Spectre. Microarchitectural attacks exploit the effects of microarchitectural components or optimizations in order to leak data to an attacker. These attacks have caused processor manufacturers to introduce performance impacting mitigations in both software and silicon. To investigate the performance impact of the various mitigations, a test suite of forty-seven different tests was created. This suite was run on a series of virtual machines that tested both Ubuntu 16 and Ubuntu 18. These tests investigated the performance change across version updates and the performance impact of CPU core number vs. default microarchitectural mitigations. The testing proved that the performance impact of the microarchitectural mitigations is non-trivial, as the percent difference in performance can be as high as 200%.
4

Ben-Mosbah, Azza. "Privacy-preserving spectrum sharing." Thesis, Evry, Institut national des télécommunications, 2017. http://www.theses.fr/2017TELE0008/document.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Les bandes des fréquences, telles qu'elles sont aménagées aujourd'hui, sont statiquement allouées. Afin d'améliorer la productivité et l'efficacité de l'utilisation du spectre, une nouvelle approche a été proposée : le "partage dynamique du spectre". Les régulateurs, les industriels et les scientifiques ont examiné le partage des bandes fédérales entre les détenteurs de licences (utilisateurs primaires) et les nouveaux entrants (utilisateurs secondaires). La nature d'un tel partage peut faciliter les attaques d'inférence et mettre en péril les paramètres opérationnels des utilisateurs primaires. Par conséquent, le but de cette thèse est d'améliorer la confidentialité des utilisateurs primaires tout en permettant un accès secondaire au spectre. Premièrement, nous présentons une brève description des règles de partage et des exigences en termes de confidentialité dans les bandes fédérales. Nous étudions également les techniques de conservation de confidentialité (obscurcissement) proposées dans les domaines d'exploration et d'édition de données pour contrecarrer les attaques d'inférence. Ensuite, nous proposons et mettons en œuvre notre approche pour protéger la fréquence et la localisation opérationnelles contre les attaques d'inférence. La première partie étudie la protection de la fréquence opérationnelle en utilisant un obscurcissement inhérent et explicite pour préserver la confidentialité. La deuxième partie traite la protection de la localisation opérationnelle en utilisant la confiance comme principale contre-mesure pour identifier et atténuer un risque d'inférence. Enfin, nous présentons un cadre axé sur les risques qui résume notre travail et s'adapte à d'autres approches de protection de la confidentialité. Ce travail est soutenu par des modèles, des simulations et des résultats qui focalisent sur l'importance de quantifier les techniques de préservation de la confidentialité et d'analyser le compromis entre la protection de la confidentialité et l'efficacité du partage du spectre
Radio frequencies, as currently allocated, are statically managed. Spectrum sharing between commercial users and incumbent users in the Federal bands has been considered by regulators, industry, and academia as a great way to enhance productivity and effectiveness in spectrum use. However, allowing secondary users to share frequency bands with sensitive government incumbent users creates new privacy threats in the form of inference attacks. Therefore, the aim of this thesis is to enhance the privacy of the incumbent while allowing secondary access to the spectrum. First, we present a brief description of different sharing regulations and privacy requirements in Federal bands. We also survey the privacy-preserving techniques (i.e., obfuscation) proposed in data mining and publishing to thwart inference attacks. Next, we propose and implement our approach to protect the operational frequency and location of the incumbent operations from inferences. We follow with research on frequency protection using inherent and explicit obfuscation to preserve the incumbent's privacy. Then, we address location protection using trust as the main countermeasure to identify and mitigate an inference risk. Finally, we present a risk-based framework that integrates our work and accommodates other privacy-preserving approaches. This work is supported with models, simulations and results that showcase our work and quantify the importance of evaluating privacy-preserving techniques and analyzing the trade-off between privacy protection and spectrum efficiency
5

Nicholson, Andrew. "Wide spectrum attribution : using deception for attribution intelligence in cyber attacks." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber attack is low. Computing power is cheap, targets are diverse and plentiful. Point-and-click crimeware kits are widely circulated in the underground economy, while source code for sophisticated malware such as Stuxnet is available for all to download and repurpose. Despite decades of research into defensive techniques, such as firewalls, intrusion detection systems, anti-virus, code auditing, etc, the quantity of successful cyber attacks continues to increase, as does the number of vulnerabilities identified. Measures to identify perpetrators, known as attribution, have existed for as long as there have been cyber attacks. The most actively researched technical attribution techniques involve the marking and logging of network packets. These techniques are performed by network devices along the packet journey, which most often requires modification of existing router hardware and/or software, or the inclusion of additional devices. These modifications require wide-scale infrastructure changes that are not only complex and costly, but invoke legal, ethical and governance issues. The usefulness of these techniques is also often questioned, as attack actors use multiple stepping stones, often innocent systems that have been compromised, to mask the true source. As such, this thesis identifies that no publicly known previous work has been deployed on a wide-scale basis in the Internet infrastructure. This research investigates the use of an often overlooked tool for attribution: cyber de- ception. The main contribution of this work is a significant advancement in the field of deception and honeypots as technical attribution techniques. Specifically, the design and implementation of two novel honeypot approaches; i) Deception Inside Credential Engine (DICE), that uses policy and honeytokens to identify adversaries returning from different origins and ii) Adaptive Honeynet Framework (AHFW), an introspection and adaptive honeynet framework that uses actor-dependent triggers to modify the honeynet envi- ronment, to engage the adversary, increasing the quantity and diversity of interactions. The two approaches are based on a systematic review of the technical attribution litera- ture that was used to derive a set of requirements for honeypots as technical attribution techniques. Both approaches lead the way for further research in this field.
6

Zabransky, Douglas Milton. "Incorporating Obfuscation Techniques in Privacy Preserving Database-Driven Dynamic Spectrum Access Systems." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Modern innovation is a driving force behind increased spectrum crowding. Several studies performed by the National Telecommunications and Information Administration (NTIA), Federal Communications Commission (FCC), and other groups have proposed Dynamic Spectrum Access (DSA) as a promising solution to alleviate spectrum crowding. The spectrum assignment decisions in DSA will be made by a centralized entity referred to as as spectrum access system (SAS); however, maintaining spectrum utilization information in SAS presents privacy risks, as sensitive Incumbent User (IU) operation parameters are required to be stored by SAS in order to perform spectrum assignments properly. These sensitive operation parameters may potentially be compromised if SAS is the target of a cyber attack or an inference attack executed by a secondary user (SU). In this thesis, we explore the operational security of IUs in SAS-based DSA systems and propose a novel privacy-preserving SAS-based DSA framework, Suspicion Zone SAS (SZ-SAS), the first such framework which protects against both the scenario of inference attacks in an area with sparsely distributed IUs and the scenario of untrusted or compromised SAS. We then define modifications to the SU inference attack algorithm, which demonstrate the necessity of applying obfuscation to SU query responses. Finally, we evaluate obfuscation schemes which are compatible with SZ-SAS, verifying the effectiveness of such schemes in preventing an SU inference attack. Our results show SZ-SAS is capable of utilizing compatible obfuscation schemes to prevent the SU inference attack, while operating using only homomorphically encrypted IU operation parameters.
Master of Science
7

Grimsdal, Gunnar, and Patrik Lundgren. "Examining the Impact of Microarchitectural Attacks on Microkernels : a study of Meltdown and Spectre." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-159999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Most of today's widely used operating systems are based on a monolithic design and have a very large code size which complicates verification of security-critical applications. One approach to solving this problem is to use a microkernel, i.e., a small kernel which only implements the bare necessities. A system usinga microkernel can be constructed using the operating-system framework Genode, which provides security features and a strict process hierarchy. However, these systems may still be vulnerable to microarchitectural attacks, which can bypassan operating system's security features, exploiting vulnerable hardware. This thesis aims to investigate whether microkernels are vulnerable to the microarchitectural attacks Meltdown and Spectre version 1 in the context of Genode. Furthermore, the thesis analyzes the execution cost of mitigating Spectre version 1 in a Genode's remote procedure call. The result shows how Genode does not mitigate the Meltdown attack, which will be confirmed by demonstrating a working Meltdown attack on Genode+Linux. We also determine that microkernels are vulnerable to Spectre by demonstrating a working attack against two microkernels. However, we show that the cost of mitigating this Spectre attack is small, with a cost of < 3 slowdown for remote procedure calls in Genode.
8

Delvecchio, Matthew David. "Enhancing Communications Aware Evasion Attacks on RFML Spectrum Sensing Systems." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Recent innovations in machine learning have paved the way for new capabilities in the field of radio frequency (RF) communications. Machine learning techniques such as reinforcement learning and deep neural networks (DNN) can be leveraged to improve upon traditional wireless communications methods so that they no longer require expertly-defined features. Simultaneously, cybersecurity and electronic warfare are growing areas of focus and concern in an increasingly technology-driven world. Privacy and confidentiality of communication links are both more important and more difficult than ever in the current high threat environment. RF machine learning (RFML) systems contribute to this threat as they have been shown to be successful in gleaning information from intercepted signals, through the use of learning-enabled eavesdroppers. This thesis focuses on a method of defense against such communications threats termed an adversarial evasion attack in which intelligently crafted perturbations of the RF signal are used to fool a DNN-enabled classifier, therefore securing the communications channel. One often overlooked aspect of evasion attacks is the concept of maintaining intended use. In other words, while an adversarial signal, or more generally an adversarial example, should fool the DNN it is attacking, this should not come at the detriment to it's primary application. In RF communications, this manifests in the idea that the communications link must be successfully maintained with friendly receivers, even when executing an evasion attack against malicious receivers. This is a difficult scenario, made even more so by the nature of channel effects present in over-the-air (OTA) communications, as is assumed in this work. Previous work in this field has introduced a form of evasion attack for RFML systems called a communications aware attack that explicitly addresses the reliable communications aspect of the attack by training a separate DNN to craft adversarial signals; however, this work did not utilize the full RF processing chain and left residual indicators of the attack that could be leveraged for defensive capabilities. First, this thesis focuses on implementing forward error correction (FEC), an aspect present in most communications systems, in the training process of the attack. It is shown that introducing this into the training stage allows the communications aware attack to implicitly use the structure of the coding to create smarter and more efficient adversarial signals. Secondly, this thesis then addresses the fact that in previous work, the resulting adversarial signal exhibiting significant out-of-band frequency content, a limitation that can be used to render the attack ineffective if preprocessing at the attacked DNN is assumed. This thesis presents two novel approaches to solve this problem and eliminate the majority of side content in the attack. By doing so, the communications aware attack is more readily applicable to real-world scenarios.
Master of Science
Deep learning has started infiltrating many aspects of society from the military, to academia, to commercial vendors. Additionally, with the recent deployment of 5G technology, connectivity is more readily accessible than ever and an increasingly large number of systems will communicate with one another across the globe. However, cybersecurity and electronic warfare call into question the very notion of privacy and confidentiality of data and communication streams. Deep learning has further improved these intercepting capabilities. However, these deep learning systems have also been shown to be vulnerable to attack. This thesis exists at the nexus of these two problems, both machine learning and communication security. This work expands upon adversarial evasion attacks meant to help elude signal classification at a deep learning-enabled eavesdropper while still providing reliable communications to a friendly receiver. By doing so, this work both provides a new methodology that can be used to conceal communication information from unwanted parties while also highlighting the glaring vulnerabilities present in machine learning systems.
9

Jackson, David. "Exploiting Rogue Signals to Attack Trust-based Cooperative Spectrum Sensing in Cognitive Radio Networks." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cognitive radios are currently presented as the solution to the ever-increasing spectrum shortage problem. However, their increased capabilities over traditional radios introduce a new dimension of security threats. Cooperative Spectrum Sensing (CSS) has been proposed as a means to protect cognitive radio networks from the well known security threats: Primary User Emulation (PUE) and Spectrum Sensing Data Falsification (SSDF). I demonstrate a new threat to trust-based CSS protocols, called the Rogue Signal Framing (RSF) intrusion. Rogue signals can be exploited to create the illusion of malicious sensors which leads to the framing of innocent sensors and consequently, their removal from the shared spectrum sensing. Ultimately, with fewer sensors working together, the spectrum sensing is less robust for making correct spectrum access decisions. The simulation experiments illustrate the impact of RSF intrusions which, in severe cases, shows roughly 40\% of sensors removed. To mitigate the RSF intrusion's damage to the network's trust, I introduce a new defense based on community detection from analyzing the network's Received Signal Strength (RSS) diversity. Tests show a 95\% damage reduction in terms of removed sensors from the shared spectrum sensing, thus retaining the benefits of CSS protocols.
10

Chen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The tremendous success of various wireless applications operating in unlicensed bands has resulted in the overcrowding of those bands. Cognitive radio (CR) is a new technology that enables an unlicensed user to coexist with incumbent users in licensed spectrum bands without inducing interference to incumbent communications. This technology can significantly alleviate the spectrum shortage problem and improve the efficiency of spectrum utilization. Networks consisting of CR nodes (i.e., CR networks)---often called dynamic spectrum access networks or NeXt Generation (XG) communication networks---are envisioned to provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques. In recent years, the operational aspects of CR networks have attracted great research interest. However, research on the security aspects of CR networks has been very limited. In this thesis, we discuss security issues that pose a serious threat to CR networks. Specifically, we focus on three potential attacks that can be launched at the physical or MAC layer of a CR network: primary user emulation (PUE) attack, spectrum sensing data falsification (SSDF) attack, and control channel jamming (CCJ) attack. These attacks can wreak havoc to the normal operation of CR networks. After identifying and analyzing the attacks, we discuss countermeasures. For PUE attacks, we propose a transmitter verification scheme for attack detection. The scheme utilizes the location information of transmitters together with their signal characteristics to verify licensed users and detect PUE attackers. For both SSDF attacks and CCJ attacks, we seek countermeasures for attack mitigation. In particular, we propose Weighted Sequential Probability Ratio Test (WSPRT) as a data fusion technique that is robust against SSDF attacks, and introduce a multiple-rendezvous cognitive MAC (MRCMAC) protocol that is robust against CCJ attacks. Using security analysis and extensive numerical results, we show that the proposed schemes can effectively counter the aforementioned attacks in CR networks.
Ph. D.

Books on the topic "Spectre attack":

1

Michael, Green. Night attack gunships: The AC-130H spectres. Mankato, Minn: Capstone Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Filip, Corneliu. America sub spectrul terorismului: Consemnări de călător în S.U.A., Canada și Mexic. Botoșani: AXA, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Michael, Green, and Gladys Green. Night Attack Gunships: The Ac-130H Spectres (War Planes). Capstone High-Interest Books, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lichtman, Robert M. The “Red Monday” Decisions, Jencks, and a Crescendo of Anti-Court Attacks. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252037009.003.0007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This chapter discusses the U.S. Supreme Court’s decisions during its October 1956 term. The Court’s level of resistance to repressive McCarthy-era government action reached its zenith in the 1956 term. The Court issued eleven signed decisions in “Communist” cases, and the government lost them all. Four were issued the same day, June 17, 1957, a day critics called “Red Monday.” Two other significant cases were decided in per curiam opinions, again adversely to the government. The decisions, spanning the spectrum of anti-“subversive” actions, seemed to indicate diminished concern by the Court for adverse reaction. Among several decisions relating to Smith Act prosecutions, one, Yates v. United States, not only reversed the convictions of fourteen Community Party of America officials but also made it more difficult for the government to secure future Smith Act conspiracy convictions.
5

Matiello, Marcelo, and Tamara B. Kaplan. A Mother Who Could Not See Her Baby. Edited by Angela O’Neal. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190609917.003.0027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Neuromyelitis optica spectrum disorders (NMOSD) belong to a group of relapsing neurological syndromes characterized by significant morbidity and mortality due to central nervous system (CNS) inflammation and necrosis. Most patients are seropositive for pathogenic antibodies targeting Aquaporin-4, and while this water channel is mostly expressed on the foot processes of astrocytes, it is also expressed in placental tissues. On planning a pregnancy, patients should be well informed about the increased risk of preeclampsia and miscarriages, and that most medications used to treat NMOSD have potentially severe toxicities to the fetus. There is also increased risk of relapses in the postpartum period, and immunosuppressive agents are the mainstream method of preventing attacks.
6

Coyle, Patricia K. Immune-mediated Disorders of the Central Nervous System. Edited by Emma Ciafaloni, Cheryl Bushnell, and Loralei L. Thornburg. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190667351.003.0010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This chapter reviews pregnancy in multiple sclerosis (MS), neuromyelitis optica spectrum disorder (NMOSD), and acute transverse myelitis (ATM) syndrome. MS is a major acquired disease of young adults, with a rising female predominance. MS has no direct negative consequences on fertility or pregnancy. Pregnancy has a profound effect on MS, with decrease in disease activity during the last trimester counteracted by a three-month postpartum increase in disease activity. With the development of disease-modifying therapies, important questions arise about washout periods, the feasibility and risks of treating during pregnancy and breastfeeding, and the potential of treatment-related adverse fetal effects. Fortunately, there is good information to counsel women with MS. Neuromyelitis Optica Spectrum Disorder (NMOSD) is a neuroimmune channelopathy. It is a distinct disorder from MS. NMOSD disease activity is not favorably affected by pregnancy. The postpartum period has real risk for disabling attacks. This influences recommendations about breastfeeding and how quickly to resume therapy postpartum. Acute transverse myelitis (ATM) syndrome can occur in both MS and NMOSD but can also be due to other disorders. Workup and treatment of ATM during pregnancy is reviewed, as well as implications for delivery.
7

Khan, Muhammad Asim. Clinical features. Oxford University Press, 2016. http://dx.doi.org/10.1093/med/9780198734444.003.0011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The leading chronic progressive inflammatory disease of the sacroiliac joints and the spinal column, traditionally known as ankylosing spondylitis (AS), is a relatively common but insidious rheumatic disease that can cause progressive limitation of physical function. It is a prototype of related forms of arthritis, grouped under the term spondyloarthritis that is subdivided into predominantly axial and predominantly peripheral forms. This chapter details the clinical features of axial spondyloarthritis, a term that encompasses ankylosing spondylitis. There is a predilection for the inflammation to affect sites where the tendons and ligaments attach to the bones (entheses) and can result in gradual and progressive spinal ankylosis, with resultant physical deformity. The disease may present with a wide spectrum of clinical features, both articular and extra-articular, and can be difficult to diagnose in early stages.
8

Saperstein, Marc. Jewish Preaching in Times of War, 1800 - 2001. Liverpool University Press, 2012. http://dx.doi.org/10.3828/liverpool/9781906764401.001.0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Wartime sermons reveal how Jews perceive themselves in relation to the majority society and how Jewish and national values are reconciled when the fate of a nation is at stake. They also illustrate how rabbis guide their communities through the challenges of their times. The sermons reproduced here were delivered by American and British rabbis from across the Jewish spectrum from the Napoleonic Wars to the attacks of 9/11. Each sermon is prefaced by a comprehensive introduction explaining the context in which it was delivered. Detailed notes explain allusions unfamiliar to a present-day readership and draw comparisons where appropriate to similar passages in contemporary newspapers and other sermons. A general introduction surveys more broadly the distinctive elements of modern Jewish preaching. What Jewish religious leaders said to their congregations when their countries went to war (or, in some cases, were considering going to war) raises questions of central significance for both modern Jewish history and religious thinking in the civic context. This book makes an important contribution to the American- and Anglo-Jewish history of this period while also making available a collection of mostly unknown Jewish texts produced at dramatic moments of the past two centuries.
9

Scaglia, Ilaria. The Emotions of Internationalism. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198848325.001.0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
By examining a broad range of individuals and institutions engaged in international cooperation in the Alps in the 1920s and 1930s, this book explains how internationalists constructed and used emotions to attain their goals. It undertakes a journey through the most diverse terrains and venues, from the international art exhibitions and congresses organized by the Union Internationale des Associations d’Alpinisme (also known as UIAA, or the International Mountaineering and Climbing Federation), to the summer camps and schools run by transnational bodies such as the League for Open-Air Education, to the international sanatoria for students, workers, and soldiers healing from tuberculosis in the Swiss village of Leysin. Along the way, this study encounters a broad spectrum of state and non-state actors involved a variety of cross-border endeavors, from large-scale infrastructure projects akin to the tunnel under the Mont Cenis, to the League of Nations and its propaganda efforts, to the plethora of smaller international organizations emulating the League’s work in fields as diverse as leisure, health, and education. Through this metaphorical travel, this book thus argues that starting from the nineteenth century and accelerating in the interwar years emotions became a fundamental feature of internationalism, shaped its development, and constitute an essential dimension of international history to this day.
10

Byman, Daniel. Al Qaeda, the Islamic State, and the Global Jihadist Movement. Oxford University Press, 2015. http://dx.doi.org/10.1093/wentk/9780190217259.001.0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
On the morning of September 11, 2001, the entire world was introduced to Al Qaeda and its enigmatic leader, Osama bin Laden. But the organization that changed the face of terrorism forever and unleashed a whirlwind of counterterrorism activity and two major wars had been on the scene long before that eventful morning. In Al Qaeda, the Islamic State, and the Global Jihadist Movement: What Everyone Needs to Know, Daniel L. Byman, an eminent scholar of Middle East terrorism and international security who served on the 9/11 Commission, provides a sharp and concise overview of Al Qaeda, from its humble origins in the mountains of Afghanistan to the present, explaining its perseverance and adaptation since 9/11 and the limits of U.S. and allied counterterrorism efforts. The organization that would come to be known as Al Qaeda traces its roots to the anti-Soviet jihad in Afghanistan in the 1980s. Founded as the Soviets withdrew from Afghanistan, Al Qaeda achieved a degree of international notoriety with a series of spectacular attacks in the 1990s; however, it was the dramatic assaults on the World Trade Center and the Pentagon on 9/11 that truly launched Al Qaeda onto the global stage. The attacks endowed the organization with world-historical importance and provoked an overwhelming counterattack by the United States and other western countries. Within a year of 9/11, the core of Al Qaeda had been chased out of Afghanistan and into a variety of refuges across the Muslim world. Splinter groups and franchised offshoots were active in the 2000s in countries like Pakistan, Iraq, and Yemen, but by early 2011, after more than a decade of relentless counterterrorism efforts by the United States and other Western military and intelligence services, most felt that Al Qaeda's moment had passed. With the death of Osama bin Laden in May of that year, many predicted that Al Qaeda was in its death throes. Shockingly, Al Qaeda has staged a remarkable comeback in the last few years. In almost every conflict in the Muslim world, from portions of the Xanjing region in northwest China to the African subcontinent, Al Qaeda franchises or like-minded groups have played a role. Al Qaeda's extreme Salafist ideology continues to appeal to radicalized Sunni Muslims throughout the world, and it has successfully altered its organizational structure so that it can both weather America's enduring full-spectrum assault and tailor its message to specific audiences. Authoritative and highly readable, Byman's account offers readers insightful and penetrating answers to the fundamental questions about Al Qaeda: who they are, where they came from, where they're going-and, perhaps most critically-what we can do about it.

Book chapters on the topic "Spectre attack":

1

Boothby, Bill. "Autonomous Attack—Opportunity or Spectre?" In Yearbook of International Humanitarian Law 2013, 71–88. The Hague: T.M.C. Asser Press, 2014. http://dx.doi.org/10.1007/978-94-6265-038-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kavut, Selçuk, and Melek D. Yücel. "Slide Attack on Spectr-H64." In Progress in Cryptology — INDOCRYPT 2002, 34–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36231-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Joshi, Francis R., and Elizabeth A. Warburton. "Transient Ischaemic Attack (Neuroimaging Findings)." In PET and SPECT in Neurology, 547–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54307-4_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Jingjing, Kefei Chen, and Shixiong Zhu. "Annihilators of Fast Discrete Fourier Spectra Attacks." In Advances in Information and Computer Security, 182–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34117-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chingovska, Ivana, Nesli Erdogmus, André Anjos, and Sébastien Marcel. "Face Recognition Systems Under Spoofing Attacks." In Face Recognition Across the Imaging Spectrum, 165–94. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28501-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dehbaoui, Amine, Victor Lomne, Philippe Maurine, Lionel Torres, and Michel Robert. "Enhancing Electromagnetic Attacks Using Spectral Coherence Based Cartography." In VLSI-SoC: Technologies for Systems Integration, 135–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23120-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cao, Jian, and Jiwu Huang. "Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework." In Information Hiding, 249–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16435-4_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, Hong, and Yong Li. "Research on Anti PUE Attack Based on CAF Spectrum and Repeated-Game." In Communications and Networking, 450–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78139-6_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lounis, Karim, and Mohammad Zulkernine. "Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs." In Lecture Notes in Computer Science, 49–66. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68887-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chatterjee, Pinaki Sankar, and Monideepa Roy. "Base Station Controlled Spectrum Allocation Technique to Detect the PUE Attack in CWSN." In Computational Intelligence in Data Mining - Volume 1, 689–98. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-2205-7_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Spectre attack":

1

Ayoub, Pierre, and Clémentine Maurice. "Reproducing Spectre Attack with gem5." In EuroSys '21: Sixteenth European Conference on Computer Systems. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3447852.3458715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abdul Kadir, Mohd Fadzil, Jin Kee Wong, Fauziah Ab Wahab, Ahmad Faisal Amri Abidin Bharun, Mohamad Afendee Mohamed, and Aznida Hayati Zakaria. "Retpoline Technique for Mitigating Spectre Attack." In 2019 6th International Conference on Electrical and Electronics Engineering (ICEEE). IEEE, 2019. http://dx.doi.org/10.1109/iceee2019.2019.00026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kovalchuk, Lyudmila, Mariia Rodinko, and Roman Oliynykov. "Upper bound probability of double spend attack on SPECTRE." In MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3410699.3413792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Johnson, Andrew, and Ross Davies. "Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods." In 2019 7th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2019. http://dx.doi.org/10.1109/isdfs.2019.8757547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fazio, Peppino, Mauro Tropea, Salvatore Marano, and Miroslav Voznak. "Meaningful attack graph reconstruction through stochastic marking analysis." In 2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). IEEE, 2016. http://dx.doi.org/10.1109/spects.2016.7570519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kocher, Paul, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, et al. "Spectre Attacks: Exploiting Speculative Execution." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

K Das, Ashish, Quynh Thi Nguyen, and Susan Thomas. "Entertaining Whilst Defacing Websites: Psychological Games for Hackers." In InSITE 2017: Informing Science + IT Education Conferences: Vietnam. Informing Science Institute, 2017. http://dx.doi.org/10.28945/3721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Aim/Purpose: This study aims to investigate various characteristics from both victims as defaced websites and defacers that linked to a risk of being defaced through a set of descriptive analysis. Background: The current figures from a spectrum of sources, both academic and non-academic reports, proved a progressive increase of website defacement attacks to numerous organisations. Methodology: This study obtains a set of data from Zone-H site, which is accessible to the public, including 99,437 defaced websites. The descriptive analysis is applied in order to understand the motives of defacers and the probability of website re-defacements through the statistical investigation. Findings: The motives for defacing websites are driven mainly due to entertaining reasons. This in turn has an implication on the type of techniques defacers attack websites.
8

Hodgers, P., K. H. Boey, and M. O'Neill. "Variable window power spectral density attack." In 2011 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2011. http://dx.doi.org/10.1109/wifs.2011.6123145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fulai Liu, Ying Zhou, Zhenxing Sun, Ruiyan Du, and Juan Sheng. "Dynamic attack probability based Spectrum Sensing against Byzantine attack in Cognitive Radio." In 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE, 2016. http://dx.doi.org/10.1109/compcomm.2016.7924951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Garnaev, Andrey, Wade Trappe, Y. Thomas Hou, and Wenjing Lou. "Spectrum attacks aimed at minimizing spectrum opportunities." In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2017. http://dx.doi.org/10.1109/icassp.2017.7952525.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography