2,132 research outputs found
POSTER: Towards Secure 5G Infrastructures for Production Systems
To meet the requirements of modern production, industrial communication
increasingly shifts from wired fieldbus to wireless 5G communication. Besides
tremendous benefits, this shift introduces severe novel risks, ranging from
limited reliability over new security vulnerabilities to a lack of
accountability. To address these risks, we present approaches to (i) prevent
attacks through authentication and redundant communication, (ii) detect
anomalies and jamming, and (iii) respond to detected attacks through device
exclusion and accountability measures.Comment: Accepted to the poster session of the 22nd International Conference
on Applied Cryptography and Network Security (ACNS 2024
MemShield: GPU-assisted software memory encryption
Cryptographic algorithm implementations are vulnerable to Cold Boot attacks,
which consist in exploiting the persistence of RAM cells across reboots or
power down cycles to read the memory contents and recover precious sensitive
data. The principal defensive weapon against Cold Boot attacks is memory
encryption. In this work we propose MemShield, a memory encryption framework
for user space applications that exploits a GPU to safely store the master key
and perform the encryption/decryption operations. We developed a prototype that
is completely transparent to existing applications and does not require changes
to the OS kernel. We discuss the design, the related works, the implementation,
the security analysis, and the performances of MemShield.Comment: 14 pages, 2 figures. In proceedings of the 18th International
Conference on Applied Cryptography and Network Security, ACNS 2020, October
19-22 2020, Rome, Ital
- …