AbstractWe report on the challenges faced in the implementation and simulation of a side-channel communication based on frames with an intentionally corrupted Frame Check Sequence (FCS). Systematically corrupted FCSs can be used to enable covert communications between nodes that share the same algorithm for deciphering the FCS. In order to assess the possibility in detecting this side-channel communication it is necessary to have the ability to simulate it as well as to implement it on actual devices. Nearly all simulators drop corrupted frames before they reach their destination, making it impossible to simulate any side-channel communication based on intentionally corrupted FCS. We present an example of the modifications required to preve...
In this dissertation, we investigated the methods for development of embedded channels within error ...
In this paper, we outline a novel, forward error correction-based information hiding technique for a...
An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to ...
This thesis presents the establishment of a covert-channel in wireless networks in the form of frame...
AbstractSide-channel communication is a form of traffic in which malicious parties communicate secre...
AbstractWireless technology has become a main player in communication through its desirable mobility...
Cryptography is the foundation of modern IT security,it provides algorithms and protocols that can b...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
AbstractThe paper presents a novel technique to detect Denial of Service (DoS) attacks applied by mi...
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless comput...
Corrupted frames with CRC errors potentially provide a useful channel through which information can...
Corrupted frames with CRC errors potentially provide a useful channel through which information can ...
Abstract—Early detection of side-channel leakage in the design of a digital crypto-circuit is as imp...
International audienceThis paper aims at presenting an approach to validate, verify and debug a wire...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
In this dissertation, we investigated the methods for development of embedded channels within error ...
In this paper, we outline a novel, forward error correction-based information hiding technique for a...
An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to ...
This thesis presents the establishment of a covert-channel in wireless networks in the form of frame...
AbstractSide-channel communication is a form of traffic in which malicious parties communicate secre...
AbstractWireless technology has become a main player in communication through its desirable mobility...
Cryptography is the foundation of modern IT security,it provides algorithms and protocols that can b...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
AbstractThe paper presents a novel technique to detect Denial of Service (DoS) attacks applied by mi...
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless comput...
Corrupted frames with CRC errors potentially provide a useful channel through which information can...
Corrupted frames with CRC errors potentially provide a useful channel through which information can ...
Abstract—Early detection of side-channel leakage in the design of a digital crypto-circuit is as imp...
International audienceThis paper aims at presenting an approach to validate, verify and debug a wire...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
In this dissertation, we investigated the methods for development of embedded channels within error ...
In this paper, we outline a novel, forward error correction-based information hiding technique for a...
An embedded cryptographic device performs operation on sensitive data and as such, is vulnerable to ...