7,932 research outputs found

    Side-channel based intrusion detection for industrial control systems

    Full text link
    Industrial Control Systems are under increased scrutiny. Their security is historically sub-par, and although measures are being taken by the manufacturers to remedy this, the large installed base of legacy systems cannot easily be updated with state-of-the-art security measures. We propose a system that uses electromagnetic side-channel measurements to detect behavioural changes of the software running on industrial control systems. To demonstrate the feasibility of this method, we show it is possible to profile and distinguish between even small changes in programs on Siemens S7-317 PLCs, using methods from cryptographic side-channel analysis.Comment: 12 pages, 7 figures. For associated code, see https://polvanaubel.com/research/em-ics/code

    Side-channel Analysis of Subscriber Identity Modules

    Get PDF
    Subscriber identity modules (SIMs) contain useful forensic data but are often locked with a PIN code that restricts access to this data. If an invalid PIN is entered several times, the card locks and may even destroy its stored data. This presents a challenge to the retrieval of data from the SIM when the PIN is unknown. The field of side-channel analysis (SCA) collects, identifies, and processes information leaked via inadvertent channels. One promising side-channel leakage is that of electromagnetic (EM) emanations; by monitoring the SIM\u27s emissions, it may be possible to determine the correct PIN to unlock the card. This thesis uses EM SCA techniques to attempt to discover the SIM card\u27s PIN. The tested SIM is subjected to simple and differential electromagnetic analysis. No clear data dependency or correlation is apparent. The SIM does reveal information pertaining to its validation routine, but the value of the card\u27s stored PIN does not appear to leak via EM emissions. Two factors contributing to this result are the black-box nature of PIN validation and the hardware and software SCA countermeasures. Further experimentation on SIMs with known operational characteristics is recommended to determine the viability of future SCA attacks on these devices

    A cooperative cellular and broadcast conditional access system for Pay-TV systems

    Get PDF
    This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.The lack of interoperability between Pay-TV service providers and a horizontally integrated business transaction model have compromised the competition in the Pay-TV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the Pay-TV systems. As a result, this paper presents the Mobile Conditional Access System (MICAS) as an end-to-end access control solution for Pay-TV systems. It incorporates the mobile and broadcasting systems and provides a platform whereby service providers can effectively interact with their customers, personalize their services and adopt appropriate security measurements. This would result in the decrease of operating expenses and increase of customers' satisfaction in the system. The paper provides an overview of state-of-the-art conditional access solutions followed by detailed description of design, reference model implementation and analysis of possible MICAS security architectures.Strategy & Technology (S&T) Lt

    Hubungan antara amalan pengurusan rantaian bekalan hijau (GSCM) dan prestasi rantaian bekalan di sektor pembuatan, Batu Pahat, Johor

    Get PDF
    Pola pertumbuhan ekonomi telah meningkatkan tahap penggunaan tenaga dan bahan-bahan dan memberi kesan kepada kemampanan alam sekitar. Kemakmuran ekonomi bagi penduduk bandar yang lebih besar, lebih banyak membawa kepada pembaziran pengeluaran. Hal ini berlaku kerana penghasilan sisa dipengaruhi oleh proses perindustrian. Sisa dari sektor pembuatan boleh mendatangkan ancaman terhadap bekalan air, kesihatan awam dan alam sekitar melalui penyebaran bakteria lalu mengakibatkan pencemaran sumber air. Air yang tercemar mungkin mengandungi kepekatan bahan-bahan pencemaran yang tinggi yang dihasilkan oleh kilang-kilang dan akan datang kembali kepada pengguna melalui kitaran air sebagai sumber utama untuk kegunaan harian. Oleh itu, pengguna terdedah kepada pelbagai penyakit dan sekali gus boleh menjejaskan tahap kesihatan mereka (Khairul, Rahman & Ho, 2011). Isu alam persekitaran merupakan isu yang kian mencabar kepada organisasi perniagaan pada masa kini. Pemanasan global, pengurangan kualiti udara dan pencemaran air merupakan beberapa contoh kesan alam sekitar yang boleh dikaitkan dengan aktiviti yang selaras dengan rantaian bekalan organisasi. Pada 9 April 2009, Perdana Menteri telah mengumumkan pembentukan Kementerian Tenaga, Teknologi Hijau dan Air (KeTTHA) bagi menggantikan Kementerian Tenaga, Air dan Komunikasi. Teknologi Hijau merujuk kepada pembangunan dan aplikasi produk, peralatan serta sistem untuk memelihara alam sekitar dan alam semulajadi dan meminimumkan atau mengurangkan kesan negatif daripada aktiviti manusia
    • …
    corecore