Countermeasures Against Information Leakage Induced by Data Serialization Effects in a RISC CPU

Author(s):  
Qi Chen ◽  
Liang Liu ◽  
Xuesong Yan ◽  
Dongyan Zhao ◽  
Yidong Yuan ◽  
...  
Keyword(s):  
2012 ◽  
Vol E95.C (6) ◽  
pp. 1089-1097 ◽  
Author(s):  
Yu-ichi HAYASHI ◽  
Naofumi HOMMA ◽  
Takaaki MIZUKI ◽  
Takeshi SUGAWARA ◽  
Yoshiki KAYANO ◽  
...  

2021 ◽  
Vol 12 (1) ◽  
Author(s):  
Jin Zhang ◽  
Wei Rui ◽  
Chengrong Ma ◽  
Ying Cheng ◽  
Xiaojun Liu ◽  
...  

AbstractTransceiving ultra-weak sound typically relies on signal pre-amplification at the transmitting end via active electro-acoustic devices, which inherently perturbs the environment in the form of noise that inevitably leads to information leakage. Here we demonstrate a passive remote-whispering metamaterial (RWM) enabling weak airborne sound at audible frequencies to reach unprecedented signal enhancement without altering the detected ambient soundscape, which is based on the extraordinary scattering properties of a metamaterial formed by a pair of self-resonating subwavelength Mie meta-cavities, constituting the acoustic analogy of Förster resonance energy transfer. We demonstrate efficient non-radiative sound transfer over distances hundreds times longer than the radius of the meta-cavities, which enables the RWM to recover weak sound signals completely overwhelmed by strong noise with enhanced signal-to-noise ratio from −3 dB below the detection limit of 0 dB in free space to 17.7 dB.


Sensors ◽  
2021 ◽  
Vol 21 (6) ◽  
pp. 2057
Author(s):  
Yongho Ko ◽  
Jiyoon Kim ◽  
Daniel Gerbi Duguma ◽  
Philip Virgil Astillo ◽  
Ilsun You ◽  
...  

Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, and spoofing. In order to cope with such attacks and security threats, a proper design of robust security protocols is indispensable. Although several pieces of research have been carried out with this regard, there are still research gaps, particularly concerning UAV-to-UAV secure communication, support for perfect forward secrecy, and provision of non-repudiation. Especially in a military scenario, it is essential to solve these gaps. In this paper, we studied the security prerequisites of the UAV communication protocol, specifically in the military setting. More importantly, a security protocol (with two sub-protocols), that serves in securing the communication between UAVs, and between a UAV and a Ground Control Station, is proposed. This protocol, apart from the common security requirements, achieves perfect forward secrecy and non-repudiation, which are essential to a secure military communication. The proposed protocol is formally and thoroughly verified by using the BAN-logic (Burrow-Abadi-Needham logic) and Scyther tool, followed by performance evaluation and implementation of the protocol on a real UAV. From the security and performance evaluation, it is indicated that the proposed protocol is superior compared to other related protocols while meeting confidentiality, integrity, mutual authentication, non-repudiation, perfect forward secrecy, perfect backward secrecy, response to DoS (Denial of Service) attacks, man-in-the-middle protection, and D2D (Drone-to-Drone) security.


Sign in / Sign up

Export Citation Format

Share Document