33 research outputs found

    Runtime Code Polymorphism as a Protection against Physical Attacks

    Get PDF
    International audienceWe present a generic framework for runtime code polymorphism,applicable to a large class of computing platforms up to embeddedsystems with low computing resources (e.g. microcontrollers withfew kilo-bytes of memory). Code polymorphism is dened as the abilityto change the observable behaviour of a software component withoutchanging its functional properties. In our framework, code polymorphismis achieved thanks to runtime code generation, which oers many leversfor code transformations: we describe the use of random register allocation,random instruction selection, instruction shuing and insertion ofnoise instructions.We evaluate the eectiveness of our framework againstdierential power analysis and its overhead impact. As compared to areference implementation of AES where the cipher key could be recoveredby DPA in less than 50 traces in average, in our implementation thekey cipher could not be extracted after 10000 traces. Our experimentalevaluation shows a moderate impact in terms of performance overhead

    Template-based Fault Injection Analysis of Block Ciphers

    Get PDF
    We present the first template-based fault injection analysis of FPGA-based block cipher implementations. While template attacks have been a popular form of side-channel analysis in the cryptographic literature, the use of templates in the context of fault attacks has not yet been explored to the best of our knowledge. Our approach involves two phases. The first phase is a profiling phase where we build templates of the fault behavior of a cryptographic device for different secret key segments under different fault injection intensities. This is followed by a matching phase where we match the observed fault behavior of an identical but black-box device with the pre-built templates to retrieve the secret key. We present a generic treatment of our template-based fault attack approach for SPN block ciphers, and illustrate the same with case studies on a Xilinx Spartan-6 FPGA-based implementation of AES-128

    Do Zebra Finch Parents Fail to Recognise Their Own Offspring?

    Get PDF
    Individual recognition systems require the sender to be individually distinctive and the receiver to be able to perceive differences between individuals and react accordingly. Many studies have demonstrated that acoustic signals of almost any species contain individualized information. However, fewer studies have tested experimentally if those signals are used for individual recognition by potential receivers. While laboratory studies using zebra finches have shown that fledglings recognize their parents by their “distance call”, mutual recognition using the same call type has not been demonstrated yet. In a laboratory study with zebra finches, we first quantified between-individual acoustic variation in distance calls of fledglings. In a second step, we tested recognition of fledgling calls by parents using playback experiments. With a discriminant function analysis, we show that individuals are highly distinctive and most measured parameters show very high potential to encode for individuality. The response pattern of zebra finch parents shows that they do react to calls of fledglings, however they do not distinguish between own and unfamiliar offspring, despite individual distinctiveness. This finding is interesting in light of the observation of a high percentage of misdirected feedings in our communal breeding aviaries. Our results demonstrate the importance of adopting a receiver's perspective and suggest that variation in fledgling contact calls might not be used in individual recognition of offspring

    Identification of vocal individuality in male cuckoos using different analytical techniques

    Get PDF
    © 2017 The Author(s). Background: Individuality in vocalizations may provide an effective tool for surveying populations of the Common Cuckoo (Cuculus canorus) but there remains few data on which technique to use to identify individuality. In this research, we compared the within- and between-individual variation in cuckoo calls using two different analytical methods, and discuss the feasibility of using call individuality to count male cuckoos within a population. Methods: We recorded vocalization from 13 males, and measured 15 spectro-temporal variables for each call. The majority of these call variables (n=12) have greater variation between individuals than within individual. We first calculated the similarity (Pearson's R) for each paired calls in order to find a threshold that could distinguish calls emitted from the same or different males, and then counted the number of males based on this distinction. Second, we used the more widely accepted technique of discriminant function analysis (DFA) to identify individual male cuckoos, and compared the correct rate of classifying individuals between the two analytical methods. Results: Similarity of paired calls from the same male was significantly higher than from different males. Under a relatively broad threshold interval, we achieved a high ( > 90%) correct rate to distinguish calls and an accurate estimate of male numbers. Based on banded males (n=3), we found the similarity of paired calls from different days was lower when compared with paired calls from the same day, but this change did not obscure individual identification, as similarity values of paired calls from different days were still larger than the threshold used to distinguish calls from the same or different males. DFA also yielded a high rate (91.9%) of correct classification of individuals. Conclusions: Our study suggests that identifying individual vocalizations can form the basis of an appropriate survey method for counting male cuckoos within a population, provided the performance of different analytical techniques are compared

    The adaptation of individual information transfer in a colonial environment. The case of penguins

    No full text
    Individual recognition by voice in colonial birds has to face the acoustic properties of the colonial environment, which is a medium difficult to penetrate, and where sound propagation appears random. We examined two parameters of the communication system in penguins, in relation to the degree of coloniality of the species: first the signalling posture, with the beak directed upwards in all species except for Emperor penguins that outstandingly directs its beak downwards; second the structure of the identification signal, characterized by a beat phenomenon in Emperor and King penguins. Within the context of the search for the partner or the chick, it appeared that signalling posture and sound structure were all the more sophisticated that the sound transmission was difficul

    Penguins and their noisy world

    No full text
    Penguins identify their mate or chick by an acoustic signal, the display call. This identification is realized in a particularly constraining environment: the noisy world of a colony of thousands of birds. To fully understand how birds solve this problem of communication, we have done observations, acoustic analysis, propagation and playback experiments with 6 species of penguins studied in the field. According to our results, it appears that penguins use a particularly efficient ''anti-confusion'' and ''anti-noise'' coding system, allowing a quick identification and localization of individuals on the move in a noisy crowd.<br>Os pingüins identificam seu parceiro ou seu filhote através de um sinal acústico, o grito de exibição. Esta identificação está realizada num ambiente particularmente exigente: o mundo barulhento de uma colônia de milhares de aves. Para entender totalmente como essas aves resolvem este problema de comunicação, realizamos observações, análises acústicas e experiências de propagação e de ''play-back'' com 6 espécies de pingüins estudados no campo. Segundo nossos resultados, parece que os pingüins usam um sistema de codificação ''anti-confusão'' e ''anti-barulho'' particularmente eficiente, permitindo uma rápida identificação e localização dos indivíduos em movimento numa multidão barulhenta

    Injection of transient faults using electromagnetic pulses Practical results on a cryptographic system

    Get PDF
    Journal of Cryptology ePrint Archive: Report 2012/123.This article considers the use of magnetic pulses to inject transient faults into the calculations of a RISC micro-controller running the AES algorithm. A magnetic coil is used to generate the pulses. It induces computational faults without any physical contact with the device. The injected faults are proved to be constant (i.e. data independent) under certain experimental conditions. This behaviour, combined with the ability to choose the faulted bytes thanks to timing accuracy in the fault injection process, makes it possible to implement most of the state-of-the-art fault attack schemes

    Foraging behaviour of emperor penguins as a resource detector in winter and summer

    No full text
    The emperor penguin (Aptenodytes forsteri), which feeds only at sea, is restricted to the higher latitudes of the antarctic sea-ice habitat1–3. It breeds on the winter fast ice when temperatures are−30 °C and high winds are frequent3. Assuming entirely the task of incubating the single egg, the male fasts for about 120 days in the most severe conditions. When it is relieved by the female around hatching time, the distance between the colony and the open sea may be 100km or more4,5, but where emperors go to forage at that time or during the summer is unknown. The polynias are areas of open water in sea-ice and during winter, with the under-ice habitats at any time of the year, they are among the most difficult of all Antarctic areas to sample. Here we monitor by satellite the routes taken by emperor penguins for foraging and compare them with satellite images of sea-ice. Winter birds walking over fast ice travelled up to 296 km to feed in polynias, whereas those swimming in light pack-ice travelled as far as 895km from the breeding colony. One record of diving showed that although most dives are to mid-water depths, some are near the bottom. Obtaining such detailed information on foraging in emperor penguins means that this bird now offers a unique opportunity to investigate the Antarctic sea-ice habitat
    corecore