security applications
Recently Published Documents


TOTAL DOCUMENTS

1259
(FIVE YEARS 287)

H-INDEX

40
(FIVE YEARS 7)

2023 ◽  
Vol 55 (1) ◽  
pp. 1-33
Author(s):  
Christopher Brant ◽  
Prakash Shrestha ◽  
Benjamin Mixon-Baca ◽  
Kejun Chen ◽  
Said Varlioglu ◽  
...  

Information flow tracking was proposed more than 40 years ago to address the limitations of access control mechanisms to guarantee the confidentiality and integrity of information flowing within a system, but has not yet been widely applied in practice for security solutions. Here, we survey and systematize literature on dynamic information flow tracking (DIFT) to discover challenges and opportunities to make it practical and effective for security solutions. We focus on common knowledge in the literature and lingering research gaps from two dimensions— (i) the layer of abstraction where DIFT is implemented (software, software/hardware, or hardware) and (ii) the security goal (confidentiality and/or integrity). We observe that two major limitations hinder the practical application of DIFT for on-the-fly security applications: (i) high implementation overhead and (ii) incomplete information flow tracking (low accuracy). We posit, after review of the literature, that addressing these major impedances via hardware parallelism can potentially unleash DIFT’s great potential for systems security, as it can allow security policies to be implemented in a built-in and standardized fashion. Furthermore, we provide recommendations for the next generation of practical and efficient DIFT systems with an eye towards hardware-supported implementations.


2022 ◽  
Vol 354 ◽  
pp. 00029
Author(s):  
Adrian Bogdan Șimon-Marinică ◽  
Nicolae-Ioan Vlasin ◽  
Florin Manea ◽  
Dorin Popescu

In the following paper, experimental results regarding the effect of explosion pressure are obtained from open field experiments with detonation of explosive charges. In addition, sensors that can be used for security applications for the detection of toxic and explosive compounds, as well as mobile systems for the detection of shock waves due to explosions were used to acquire more detailed results. Sensors are the main components in products and systems used to detect chemicals and volatile organic compounds (VOCs) targeting applications in several fields, such as: industrial production and the automotive industry (detection of polluting gases from cars, medical applications, indoor air quality control. The sensory characteristics of a robot depend very much on its degree of autonomy, the applications for which it was designed and the type of work environment. The sensors can be divided into two categories: internal status sensors (sensors that provide information about the internal status of the mobile robot); external status sensors (sensors that provide information about the environment in which the robot operates). Another classification of these could be: distance sensors, position sensors, environmental sensors - sensors that provide information about various properties and characteristics of the environment (example: temperature, pressure, color, brightness), inertial sensors.


Author(s):  
Dr. Diwakar Ramanuj Tripathi

Abstract: Traditional machine learning has evolved into deep learning. It's capable of extracting the best feature representation from raw input samples. Intrusion detection, malware classification, Android malware detection, spam and phishing detection, and binary analysis are just a few examples of how this has been used in cyber security. Deep auto encoders, limited Boltzmann machines, recurrent neural networks, generative adversarial networks, and other DL methods are all described in this study in a brief tutorial-style method. After that, we'll go over how each of the DL methods is employed in security applications. Keywords: Machine, Cyber, Security, Architecture, Technology.


2021 ◽  
Vol 26 (6) ◽  
pp. 585-590
Author(s):  
Ratnakumari Challa ◽  
VijayaKumari Gunta

Homomorphic encryption (HE) schemes became popular cryptographic primitives and very useful in variety of security applications. Homomorphic encryption based on coding theory have the advantages of faster computations due to the structural properties of the codes used. Several schemes are supporting unlimited Mod2 addition operations in literature. The present paper introduces Reed-Muller (RM) code based Mod2 multiplication operation thereby making RM code based HE scheme fully homomorphic. The representation of the codeword with necessary adaption to support unlimited number of Mod2​ multiplication operations is presented along with the scheme first. The correctness proof of the homomorphic operations along with experimental evaluation is also presented to demonstrate the practical aspects of the proposal.


Author(s):  
Nozomi Akashi ◽  
Kohei Nakajima ◽  
Mitsuru Shibayama ◽  
Yasuo Kuniyoshi

Abstract Random number generation has become an indispensable part of information processing: it is essential for many numerical algorithms, security applications, and in securing fairness in everyday life. Random number generators (RNG) find application in many devices, ranging from dice and roulette wheels, via computer algorithms, lasers to quantum systems, which inevitably capitalize on their physical dynamics at respective spatio-temporal scales. Herein, to the best of our knowledge, we propose the first mathematically proven true RNG (TRNG) based on a mechanical system, particularly the triple linkage of Thurston and Weeks. By using certain parameters, its free motion has been proven to be an Anosov flow, from which we can show that it has an exponential mixing property and structural stability. We contend that this mechanical Anosov flow can be used as a TRNG, which requires that the random number should be unpredictable, irreproducible, robust against the inevitable noise seen in physical implementations, and the resulting distribution's controllability (an important consideration in practice). We investigate the proposed system's properties both theoretically and numerically based on the above four perspectives. Further, we confirm that the random bits numerically generated pass the standard statistical tests for random bits.


2021 ◽  
Author(s):  
Jean-Pierre Münch ◽  
Thomas Schneider ◽  
Hossein Yalame

Author(s):  
Camille Merlin S. Tan ◽  
Lawrence Materum

As technology advances, notable scientific research accomplishments have been made. Terahertz (THz) waves have been seen to have endless potential applications that could further improve the current limitations of other frequency bands for imaging applications. Currently, THz waves display great potential in various applications due to their noninvasive and nonionizing features. However, the THz band has not been technically well established. This paper focuses on a comparative survey of the current methods applied in THz imaging in the field of medical and industrial security applications. Different types of methods, findings, advantages, and challenges of surveys ranging from 2016 to 2021 were discussed for both medical and industrial security applications to deepen the understanding of the latest trends, research, and technologies to have efficient THz imaging systems.


Photonics ◽  
2021 ◽  
Vol 8 (12) ◽  
pp. 544
Author(s):  
Argiris Ntanos ◽  
Nikolaos K. Lyras ◽  
Dimitris Zavitsanos ◽  
Giannis Giannoulis ◽  
Athanasios D. Panagopoulos ◽  
...  

Quantum key distribution (QKD) has gained a lot of attention over the past few years, but the implementation of quantum security applications is still challenging to accomplish with the current technology. Towards a global-scale quantum-secured network, satellite communications seem to be a promising candidate to successfully support the quantum communication infrastructure (QCI) by delivering quantum keys to optical ground terminals. In this research, we examined the feasibility of satellite-to-ground QKD under daylight and nighttime conditions using the decoy-state BB84 QKD protocol. We evaluated its performance on a hypothetical constellation with 10 satellites in sun-synchronous Low Earth Orbit (LEO) that are assumed to communicate over a period of one year with three optical ground stations (OGSs) located in Greece. By taking into account the atmospheric effects of turbulence as well as the background solar radiance, we showed that positive normalized secure key rates (SKRs) up to 3.9×10−4 (bps/pulse) can be obtained, which implies that satellite-to-ground QKD can be feasible for various conditions, under realistic assumptions in an existing infrastructure.


Sign in / Sign up

Export Citation Format

Share Document