83,524 research outputs found
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent
network transmissions. Recent findings indicate that novel malware is
increasingly using network steganography. Similarly, other malicious activities
can profit from network steganography, such as data leakage or the exchange of
pedophile data. This paper provides an introduction to network steganography
and highlights its potential application for harmful purposes. We discuss the
issues related to countering network steganography in practice and provide an
outlook on further research directions and problems.Comment: 11 page
Tree Parity Machine Rekeying Architectures
The necessity to secure the communication between hardware components in
embedded systems becomes increasingly important with regard to the secrecy of
data and particularly its commercial use. We suggest a low-cost (i.e. small
logic-area) solution for flexible security levels and short key lifetimes. The
basis is an approach for symmetric key exchange using the synchronisation of
Tree Parity Machines. Fast successive key generation enables a key exchange
within a few milliseconds, given realistic communication channels with a
limited bandwidth. For demonstration we evaluate characteristics of a
standard-cell ASIC design realisation as IP-core in 0.18-micrometer
CMOS-technology
Silicon ribbon growth by a capillary action shaping technique
The crystal growth method described is a capillary action shaping technique. Meniscus shaping for the desired ribbon geometry occurs at the vertex of a wettable die. As ribbon growth depletes the melt meniscus, capillary action supplies replacement material. A capillary die is so designed that the bounding edges of the die top are not parallel or concentric with the growing ribbon. The new dies allow a higher melt meniscus with concomitant improvements in surface smoothness and freedom from SiC surface particles, which can degrade perfection
Software-Defined Networks Supporting Time-Sensitive In-Vehicular Communication
Future in-vehicular networks will be based on Ethernet. The IEEE
Time-Sensitive Networking (TSN) is a promising candidate to satisfy real-time
requirements in future car communication. Software-Defined Networking (SDN)
extends the Ethernet control plane with a programming option that can add much
value to the resilience, security, and adaptivity of the automotive
environment. In this work, we derive a first concept for combining
Software-Defined Networking with Time-Sensitive Networking along with an
initial evaluation. Our measurements are performed via a simulation that
investigates whether an SDN architecture is suitable for time-critical
applications in the car. Our findings indicate that the control overhead of SDN
can be added without a delay penalty for the TSN traffic when protocols are
mapped properly.Comment: To be published at IEEE VTC2019-Sprin
Bibliographic and Technical Problems in Implementing a National Library Network
published or submitted for publicatio
- …