32 research outputs found

    On Borrowed Time -- Preventing Static Power Side-Channel Analysis

    Full text link
    In recent years, static power side-channel analysis attacks have emerged as a serious threat to cryptographic implementations, overcoming state-of-the-art countermeasures against side-channel attacks. The continued down-scaling of semiconductor process technology, which results in an increase of the relative weight of static power in the total power budget of circuits, will only improve the viability of static power side-channel analysis attacks. Yet, despite the threat posed, limited work has been invested into mitigating this class of attack. In this work we address this gap. We observe that static power side-channel analysis relies on stopping the target circuit's clock over a prolonged period, during which the circuit holds secret information in its registers. We propose Borrowed Time, a countermeasure that hinders an attacker's ability to leverage such clock control. Borrowed Time detects a stopped clock and triggers a reset that wipes any registers containing sensitive intermediates, whose leakages would otherwise be exploitable. We demonstrate the effectiveness of our countermeasure by performing practical Correlation Power Analysis attacks under optimal conditions against an AES implementation on an FPGA target with and without our countermeasure in place. In the unprotected case, we can recover the entire secret key using traces from 1,500 encryptions. Under the same conditions, the protected implementation successfully prevents key recovery even with traces from 1,000,000 encryptions

    The Impostor Among US(B): Off-Path Injection Attacks on USB Communications

    Full text link
    USB is the most prevalent peripheral interface in modern computer systems and its inherent insecurities make it an appealing attack vector. A well-known limitation of USB is that traffic is not encrypted. This allows on-path adversaries to trivially perform man-in-the-middle attacks. Off-path attacks that compromise the confidentiality of communications have also been shown to be possible. However, so far no off-path attacks that breach USB communications integrity have been demonstrated. In this work we show that the integrity of USB communications is not guaranteed even against off-path attackers.Specifically, we design and build malicious devices that, even when placed outside of the path between a victim device and the host, can inject data to that path. Using our developed injectors we can falsify the provenance of data input as interpreted by a host computer system. By injecting on behalf of trusted victim devices we can circumvent any software-based authorisation policy defences that computer systems employ against common USB attacks. We demonstrate two concrete attacks. The first injects keystrokes allowing an attacker to execute commands. The second demonstrates file-contents replacement including during system install from a USB disk. We test the attacks on 29 USB 2.0 and USB 3.x hubs and find 14 of them to be vulnerable.Comment: To appear in USENIX Security 202

    Revealing the Appetite of the Marine Aquarium Fish Trade: The Volume and Biodiversity of Fish Imported into the United States

    Get PDF
    The aquarium trade and other wildlife consumers are at a crossroads forced by threats from global climate change and other anthropogenic stressors that have weakened coastal ecosystems. While the wildlife trade may put additional stress on coral reefs, it brings income into impoverished parts of the world and may stimulate interest in marine conservation. To better understand the influence of the trade, we must first be able to quantify coral reef fauna moving through it. Herein, we discuss the lack of a data system for monitoring the wildlife aquarium trade and analyze problems that arise when trying to monitor the trade using a system not specifically designed for this purpose. To do this, we examined an entire year of import records of marine tropical fish entering the United States in detail, and discuss the relationship between trade volume, biodiversity and introduction of non-native marine fishes. Our analyses showed that biodiversity levels are higher than previous estimates. Additionally, more than half of government importation forms have numerical or other reporting discrepancies resulting in the overestimation of trade volumes by 27%. While some commonly imported species have been introduced into the coastal waters of the USA (as expected), we also found that some uncommon species in the trade have also been introduced. This is the first study of aquarium trade imports to compare commercial invoices to government forms and provides a means to, routinely and in real time, examine the biodiversity of the trade in coral reef wildlife species

    The Role of Turtles as Coral Reef Macroherbivores

    Get PDF
    Herbivory is widely accepted as a vital function on coral reefs. To date, the majority of studies examining herbivory in coral reef environments have focused on the roles of fishes and/or urchins, with relatively few studies considering the potential role of macroherbivores in reef processes. Here, we introduce evidence that highlights the potential role of marine turtles as herbivores on coral reefs. While conducting experimental habitat manipulations to assess the roles of herbivorous reef fishes we observed green turtles (Chelonia mydas) and hawksbill turtles (Eretmochelys imbricata) showing responses that were remarkably similar to those of herbivorous fishes. Reducing the sediment load of the epilithic algal matrix on a coral reef resulted in a forty-fold increase in grazing by green turtles. Hawksbill turtles were also observed to browse transplanted thalli of the macroalga Sargassum swartzii in a coral reef environment. These responses not only show strong parallels to herbivorous reef fishes, but also highlight that marine turtles actively, and intentionally, remove algae from coral reefs. When considering the size and potential historical abundance of marine turtles we suggest that these potentially valuable herbivores may have been lost from many coral reefs before their true importance was understood

    Micro-combs: a novel generation of optical sources

    Get PDF
    The quest towards the integration of ultra-fast, high-precision optical clocks is reflected in the large number of high-impact papers on the topic published in the last few years. This interest has been catalysed by the impact that high-precision optical frequency combs (OFCs) have had on metrology and spectroscopy in the last decade [1–5]. OFCs are often referred to as optical rulers: their spectra consist of a precise sequence of discrete and equally-spaced spectral lines that represent precise marks in frequency. Their importance was recognised worldwide with the 2005 Nobel Prize being awarded to T.W. Hänsch and J. Hall for their breakthrough in OFC science [5]. They demonstrated that a coherent OFC source with a large spectrum – covering at least one octave – can be stabilised with a self-referenced approach, where the frequency and the phase do not vary and are completely determined by the source physical parameters. These fully stabilised OFCs solved the challenge of directly measuring optical frequencies and are now exploited as the most accurate time references available, ready to replace the current standard for time. Very recent advancements in the fabrication technology of optical micro-cavities [6] are contributing to the development of OFC sources. These efforts may open up the way to realise ultra-fast and stable optical clocks and pulsed sources with extremely high repetition-rates, in the form of compact and integrated devices. Indeed, the fabrication of high-quality factor (high-Q) micro-resonators, capable of dramatically amplifying the optical field, can be considered a photonics breakthrough that has boosted not only the scientific investigation of OFC sources [7–13] but also of optical sensors and compact light modulators [6,14]

    Chemistry and medical implications of novel amphibian peptides : a thesis submitted for the degree of Doctor of Philosophy / by Paul Andrew Wabnitz.

    Get PDF
    Copies of author's previously published articles inserted.Includes bibliographical references.xv, 210 leaves : ill. ; 30 cm.A chemical and pharmacological investigation of compounds derived from amphibian skin. Isolates novel amphibian peptides and further investigates the biological activity of some of the peptides discovered.Thesis (Ph.D.)--University of Adelaide, Dept. of Chemistry, 200

    A Spiking Neural Network Based Auto-encoder for Anomaly Detection in Streaming Data

    No full text
    Anomaly Detection (AD) is useful for a range of applications including cyber security, health analytics, robotics, defense and big data. Automating the detection of anomalies is necessary to deal with large volumes of data and to satisfy real time processing constraints. Current Machine Learning (ML) methods have had some success in the automated detection of anomalies, but no ideal ML solutions have been found for any domain. Spiking Neural Networks (SNNs), an emerging ML technique, have the potential to do AD well, especially for Edge applications where it needs to be low power, readily adaptable, autonomous and reliable. Here we investigate SNNs doing anomaly detection on streams of text. We show that SNNs are well suited for detecting anomalous character sequences, that they can learn rapidly, and that there are many optimizations to the SNN architecture and training that can improve AD performance.</p

    Unsupervised Feature Vector Clustering Using Temporally Coded Spiking Networks

    No full text
    Spiking Neural Networks (SNNs) remain on the fringe of machine learning research despite their potential for fast low-power performance and fully local operation, including rapid online learning, on edge computing devices. In SNNs, encoding information in the timing of individual spikes is more efficient than using spiking rates for which many spikes are required. However, combining spike-time coding with unsupervised learning has proven somewhat challenging. Here we use spike latency coding with local unsupervised spike-timing-dependent plasticity and several biologically inspired local homeostatic mechanisms that maintain network stability. We show that when trained on sequences of characters from text, the network rapidly and effectively self-organizes to learn a latent space mapping of character attributes, similar to word2vec but for characters (i.e. char2vec), forming clusters of vowels, consonants and punctuation for example. It does so with no explicit objective function and no error signal, showing that time-encoded unsupervised SNNs (STUNNs) can maintain dynamical stability while self-organizing to extract complex input relationships using only local learning rules.</p

    Time domain reconstruction of spatial sound fields using compressed sensing

    No full text
    A novel technique for time domain spatial sound reproduction using compressed sensing is presented. The presented technique is based on the application of compressed sensing theory, which is used to improve the accuracy of the reconstructed sound field. In addition, singular value decomposition is also applied, which acts to significantly reduce the size of the data set to process, thus making it efficient and realisable for real-time applications. Results are presented from the preliminary performance evaluation of the compressed sensing technique in comparison to the Higher Order Ambisonic reconstruction technique

    Open platform, 32-channel, portable, data-logger with 32 PGA control lines for wearable medical device development

    Get PDF
    A compact isolated low-power 32-channel 16-bit data-logging system around an NXP ARM processor (LPC1768) and four of the linear technology octal analogue-to-digital converters (ADCs) LTC1857/58/59 is designed. The system requires only 250 mA when powered at 5 V to run at full power (including a capacitive 2.8 inch touch-screen display and 32 Gb SHDC SD memory card). The sample rate is configurable up to 1 k SPS per channel as well as voltage dynamic input up to ±10 V; additionally, 32 chip select lines (SPI protocol) individually addressable and controllable while sampling to configure userdesigned programmable gain amplifiers (PGAs) are available. Collaboration is being sought to improve the software capabilities, particularly to enrich the very basic user interface and to add wireless connectivity. The code is available (under the GPL licence) at our repository, the gerber file to reproduce the PCB is available (on the As-Is basis) on request. The galvanic isolation between the power supply data connection and ADC channels makes the data-logger also compatible with the main powered PCs, hence it is suitable for the implementation of medical devices at least for the prototyping and initial testing stages
    corecore