A lightweight and practical anonymous authentication protocol based on bit-self-test PUF
Y An, Y Zhang, W Cao, Z Tong, Z He - Electronics, 2022 - mdpi.com
Physical unclonable function (PUF), a cryptographic primitive, has recently been used in
protocol design because it can ensure a tamper-evident feature. In many PUF-based …
protocol design because it can ensure a tamper-evident feature. In many PUF-based …
SnapCatch: automatic detection of covert timing channels using image processing and machine learning
With the rapid growth of data exfiltration carried out by cyber attacks, Covert Timing
Channels (CTC) have become an imminent network security risk that continues to grow in …
Channels (CTC) have become an imminent network security risk that continues to grow in …
Using hierarchical statistical analysis and deep neural networks to detect covert timing channels
Covert timing channels provide a mechanism to leak data across different entities.
Manipulating the timing between packet arrivals is a well-known example of such approach …
Manipulating the timing between packet arrivals is a well-known example of such approach …
Covert timing channel analysis either as cyber attacks or confidential applications
Covert timing channels are an important alternative for transmitting information in the world
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …
of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival …
Detection of covert timing channel based on time series symbolization
S Wu, Y Chen, H Tian, C Sun - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
Covert Timing Channels (CTCs) is a technique to leak information. CTCs only modify inter-
arrival time sequence (IATs) between packets, consequently, traditional network security …
arrival time sequence (IATs) between packets, consequently, traditional network security …
Aerial Reconfigurable Intelligent Surface-Assisted Channel Modeling Incorporating the Effect of UAV Fluctuations
Z Wang, J Bian, CX Wang, Y Liu… - IEEE Communications …, 2024 - ieeexplore.ieee.org
Aerial reconfigurable intelligent surface (ARIS) system refers to a novel transmission
scheme, in which an RIS is mounted on aerial platforms, such as unmanned aerial vehicles …
scheme, in which an RIS is mounted on aerial platforms, such as unmanned aerial vehicles …
Towards a streaming approach to the mitigation of covert timing channels
Leaking data using covert timing channels is considered as a critical threat in network
communication. These type of channels use the time between inter-arrival packets to pass …
communication. These type of channels use the time between inter-arrival packets to pass …
Using MapReduce and hierarchical entropy analysis to speed-up the detection of covert timing channels
Covert timing channels provide a mechanism to transmit unauthorized information across
different processes. Applications that generate large datasets allow this information to be …
different processes. Applications that generate large datasets allow this information to be …
ConTra: A Covert Timing Channel Detection Approach for Little Covert Information in a Network
Z Li, Y Chen, Z Teng, X Huang - … of the 2023 4th International Conference …, 2023 - dl.acm.org
A covert timing channel is a technical means that enables information hiding and covert
communication. Due to the fact that covert timing channels can elude detection by security …
communication. Due to the fact that covert timing channels can elude detection by security …
IoT-Enhanced Malicious URL Detection Using Machine Learning
A Weshahi, F Dwaik, M Khouli, HI Ashqar… - International Conference …, 2024 - Springer
The exponential growth of the internet has led to a surge in malicious URLs, posing a
significant threat to online security. Traditional methods, like signature-based detection, are …
significant threat to online security. Traditional methods, like signature-based detection, are …