122 research outputs found

    Exploitation of Unintentional Information Leakage from Integrated Circuits

    Get PDF
    Unintentional electromagnetic emissions are used to recognize or verify the identity of a unique integrated circuit (IC) based on fabrication process-induced variations in a manner analogous to biometric human identification. The effectiveness of the technique is demonstrated through an extensive empirical study, with results presented indicating correct device identification success rates of greater than 99:5%, and average verification equal error rates (EERs) of less than 0:05% for 40 near-identical devices. The proposed approach is suitable for security applications involving commodity commercial ICs, with substantial cost and scalability advantages over existing approaches. A systematic leakage mapping methodology is also proposed to comprehensively assess the information leakage of arbitrary block cipher implementations, and to quantitatively bound an arbitrary implementation\u27s resistance to the general class of differential side channel analysis techniques. The framework is demonstrated using the well-known Hamming Weight and Hamming Distance leakage models, and approach\u27s effectiveness is demonstrated through the empirical assessment of two typical unprotected implementations of the Advanced Encryption Standard. The assessment results are empirically validated against correlation-based differential power and electromagnetic analysis attacks

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Analysis and design of wideband voltage controlled oscillators using self-oscillating active inductors.

    Get PDF
    Voltage controlled oscillators (VCOs) are essential components of RF circuits used in transmitters and receivers as sources of carrier waves with variable frequencies. This, together with a rapid development of microelectronic circuits, led to an extensive research on integrated implementations of the oscillator circuits. One of the known approaches to oscillator design employs resonators with active inductors electronic circuits simulating the behavior of passive inductors using only transistors and capacitors. Such resonators occupy only a fraction of the silicon area necessary for a passive inductor, and thus allow to use chip area more eectively. The downsides of the active inductor approach include: power consumption and noise introduced by transistors. This thesis presents a new approach to active inductor oscillator design using selfoscillating active inductor circuits. The instability necessary to start oscillations is provided by the use of a passive RC network rather than a power consuming external circuit employed in the standard oscillator approach. As a result, total power consumption of the oscillator is improved. Although, some of the active inductors with RC circuits has been reported in the literature, there has been no attempt to utilise this technique in wideband voltage controlled oscillator design. For this reason, the dissertation presents a thorough investigation of self-oscillating active inductor circuits, providing a new set of design rules and related trade-os. This includes: a complete small signal model of the oscillator, sensitivity analysis, large signal behavior of the circuit and phase noise model. The presented theory is conrmed by extensive simulations of wideband CMOS VCO circuit for various temperatures and process variations. The obtained results prove that active inductor oscillator performance is obtained without the use of standard active compensation circuits. Finally, the concept of self-oscillating active inductor has been employed to simple and fast OOK (On-Off Keying) transmitter showing energy eciency comparable to the state of the art implementations reported in the literature

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Socially-aware congestion control in ad-hoc networks: Current status and the way forward

    Get PDF
    Ad-hoc social networks (ASNETs) represent a special type of traditional ad-hoc network in whicha user’s social properties (such as the social connections and communications metadata as wellas application data) are leveraged for offering enhanced services in a distributed infrastructurelessenvironments. However, the wireless medium, due to limited bandwidth, can easily suffer from theproblem of congestion when social metadata and application data are exchanged among nodes—a problem that is compounded by the fact that some nodes may act selfishly and not share itsresources. While a number of congestion control schemes have been proposed for the traditional ad-hoc networks, there has been limited focus on incorporating social awareness into congestion controlschemes. We revisit the existing traditional ad-hoc congestion control and data distribution protocolsand motivate the need for embedding social awareness into these protocols to improve performance.We report that although some work is available in opportunistic network that uses socially-awaretechniques to control the congestion issue, this area is largely unexplored and warrants more researchattention. In this regards, we highlight the current research progress and identify multiple futuredirections of research

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    VihreäIT metriikoiden analysointi sekä mittausviitekehyksen luonti Sonera Helsinki Datakeskus (HDC) projektille.

    Get PDF
    The two objectives of this thesis were to investigate and evaluate the most suitable set of energy efficiency metrics for Sonera Helsinki Data Center (HDC), and to analyze which energy efficient technologies could be implemented and in what order to gain most impact. Sustainable IT is a complex matter, and it has two components. First and the more complex matter is the energy efficiency and energy-proportionality of the IT environment. The second is the use of renewable energy sources. Both of these need to be addressed. This thesis is a theoretical study, and it focuses on energy efficiency. The use of off-site renewables is outside of the scope of this thesis. The main aim of this thesis is to improve energy efficiency through effective metric framework. In the final metric framework, metrics that target renewable energy usage in the data center are included as they are important from CO2 emission reduction perspective. The selection of energy efficient solutions in this thesis are examples from most important data center technology categories, and do not try to cover the whole array of different solutions to improve energy efficiency in a data center. The ontological goal is to present main energy efficiency metrics available in scientific discourse, and also present examples of energy efficient solutions in most energy consuming technology domains inside the data center. Even though some of the concepts are quite abstract, realism is taken into account in every analysis. The epistemology in this thesis is based on scientific articles that include empirical validation and scientific peer review. This forms the origin of the used knowledge and the nature of this knowledge. The findings from this thesis are considered valid and reliable based on the epistemology of scientific articles, and by using the actual planning documents of Sonera HDC. The reasoning in this thesis is done in abstracto, but there are many empirical results that qualify the results also as ´in concreto´. Findings are significant for Sonera HDC but they are also applicable for any general data center project or company seeking energy efficiency in their data centers.Lopputyöllä on kaksi päätavoitetta. Ensimmäinen tavoite on löytää sopivin mittausviitekehys energiatehokkuuden osoittamiseksi Sonera Helsinki Datakeskukselle (HDC). Toisena tavoitteena on analysoida, mitä energiatehokkaita ratkaisuja tulisi implementoida ja missä järjestyksessä, saavuttaakseen mahdollisimman ison vaikutuksen. Vihreä IT on monimutkainen asia ja samalla siihen liittyy kaksi eri komponenttia. Ensimmäisenä komponenttina, ja merkityksellisempänä sekä monimutkaisempana, on energiatehokkuus ja energian kulutuksen mukautuvuus suhteessa työkuormaan. Toinen komponentti vihreän IT:n osalta on uusiutuvien energialähteiden käyttäminen. Molemmat komponentit on huomioitava. Lopputyö on teoreettinen tutkimus. Lopputyön ontologinen tavoite on esittää keskeisimmät energiatehokkuusmittarit, jotka ovat saatavilla tieteellisessä keskustelussa, ja esittää myös esimerkkejä energiatehokkaista ratkaisuista teknologia-alueisiin, jotka kuluttavat eniten energiaa data keskuksissa. Vaikka osa esitetyistä ratkaisuista on melko abstraktissa todellisuudessa, realismi on pyritty ottamaan huomioon arvioita tehdessä. Epistemologisesti tämä lopputyö perustuu tieteellisiin artikkeleihin, joissa on tehty empiiristä validointia ja tiedeyhteisön vertaisarviointia tiedon totuusarvosta. Kirjoittaja pyrkii välttämään oman arvomaailman ja subjektiivisen näkemyksen tuomista analyysiin pyrkimällä enemmänkin arvioimaan ratkaisuja perustuen päätavoitteeseen, joka on sekä lisätä energiatehokkuutta että vähentää CO2 -päästöjä datakeskuksessa. Lopputyön löydökset todetaan valideiksi ja luotettaviksi, koska ne perustuvat tieteellisten artikkeleiden epistemologiaan ja siihen, että arvioinnin pohjana on käytetty todellisia Sonera HDC -projektin suunnitteludokumentteja. Päätelmät ja analyysit ovat abstrahoituja, mutta perustuvat empiirisiin tuloksiin, jotka koskevat käytännön tekemistä sekä valintoja. Löydökset ovat merkittäviä Sonera HDC -projektin kannalta, ja myös muille datakeskuksille, jotka haluavat toimia kestävän kehityksen pohjalta

    An optimal nephelometric model design method for particle characterisation

    Get PDF
    Scattering nephelometry is a particle characterisation method applicable to fluid suspensions containing impurities. Solutions derived by the method feature particle classification by size (diameter), volume or texture as well as continuous on-line and in-situ monitoring, The replacement of turbidimeters with nephelometers in many existing turbidity applications could result in suppression of side effects caused by limitations and uncontrolled parameter drifts and satisfaction of problem-defined constraints at virtually no change in implementation cost. A major issue of nephelometric model design is the selection of a mathematical tool suitable for the modelling of the data analysis system. [Continues.

    Design of large polyphase filters in the Quadratic Residue Number System

    Full text link
    corecore