52 research outputs found

    Smart Card Fault Injections with High Temperatures

    Get PDF
    Power and clock glitch attacks on smart cards can help an attacker to discover some internal secrets or bypass certain security checks. Also, an attacker can manipulate the temperature and supply voltage of the device, thus making the device glitch more easily. If these manipulations are within the device operating conditions, it becomes harder to distinguish between an extreme condition from an attacker. To demonstrate temperature and power supply effect on fault attacks, we perform several tests on an Atmega 163 microcontroller in different conditions. Our results show that this kind of attacks are still a serious threat to small devices, whilst maintaining the manufacturer recommendations

    Approximate analysis of surface wave-structure interaction

    Get PDF
    Surface wave-structure interaction is studied starting from a specialised approximate formulation involving a hyperbolic equation for the Rayleigh wave along with pseudostatic elliptic equations over the interior of an elastic half-space. The validity of the proposed approach for modelling a point contact is analysed. Explicit dispersion relations are derived for smooth contact stresses arising from averaging the effect of a regular array of spring-mass oscillators and also of elastic rods attached to the surface. Comparison with the exact solution of the associated plane time-harmonic problem in elasticity for the array of rods demonstrates a high efficiency of the developed methodology

    Business Model Evaluation: A Systematic Review of Methods

    Get PDF
    Background: As a result of factors such as digitization and rapid technology change, organizations are compelled to innovate their business models at an accelerated pace. While the domain of business model innovation has focused on understanding and structuring the process of innovation, it offers limited guidance for evaluating business models during the innovation process. Business model evaluation plays a vital role in supporting decision-making about the performance or viability of new business models and motivating continued investments. Existing literature on methods for business model evaluation and their application is limited and available information is scattered. Furthermore, as the BMI process covers a broad spectrum of activities - from business model initiation to implementation - the evaluation challenges and the effectiveness of evaluation methods vary across the phases of innovation. Thus, there is a need for a better understanding on methods for business model evaluation, and their timing and application for business model innovation. Method: Through a systematic literature review, we have investigated the methods available for business model evaluation and focused on understanding their characteristics and effective timing of application in the business model innovation process. Results: We have identified six groups of methods used for business model evaluation. Additionally, we find that early phase business model evaluation is predominantly qualitative in nature, whereas late phases of business model innovation are generally supported through quantitatively-oriented methods. Moreover, we observe that limited evaluation support is available in the literature to support the initiation phase of business model innovation. Based on our findings, we propose a guiding structure for aligning the available methods with the respective innovation phases. Conclusion: The proposed guiding structure offers guidance for business model evaluation in practice and serves as a basis for future research in developing more effective methods and tools for business model evaluation and development

    Near Collision Side Channel Attacks

    Get PDF
    Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar while not identical leakage. We show how such knowledge can be exploited to mount a key recovery attack. The presented approach has several desirable features when compared to other state-of-the-art collision attacks: Near collision attacks are truly univariate. They have low requirements on the leakage functions, since they work well for leakages that are linear in the bits of the targeted intermediate state. They are applicable in the presence of masking countermeasures if there exist distinguishable leakages, as in the case of leakage squeezing. Results are backed up by a broad range of simulations for unprotected and masked implementations, as well as an analysis of the measurement set provided by DPA Contest v4

    Ecosystem and Business Models of the UMOS-MobilitEU Mobility Service Platform

    Get PDF
    This report presents the findings of the detailed analysis of the current state of practice in the Mobility-as-a-Service (MaaS) landscape, and their reflection on the UMOS/MobilitEU MObility Service Platform business models and their viability. The deliverable provides input to the strategy of the platform as well as to its development. We present a summary of our findings, which are based on the existing literature and our discussions with various parties in the domain. We describe our reflection of these findings on how UMOS business models and relevant revenue channels should be shaped. We believe that the report provides important contributions not only to the UMOS/MobilitEU ecosystem - in terms of deriving the decisions for the operations of the platform, but also beyond to the general MaaS arena. The deliverable has direct influences on the commercialisation strategy in terms of depicting how the cost and benefits can be exchanged between parties and what revenue items and channels shall be activated for the UMOS platform.<br/

    Evaluating the Design of Service-Dominant Business Models: A Qualitative Method

    Get PDF
    Background: Driven by factors such as digitization and rapid technological change, many contemporary organizations adopt a service orientation to sustain competitiveness and to improve their value propositions to customers. In doing so, organizations typically engage in collaborative service ecosystems to co-create value and exchange services, and conceptualize such collaborations using business models. The resulting models should be evaluated to support the development of service ecosystems and their long- term viability. Despite academic efforts on the evaluation of traditional, organization- centric business models, limited research is present supporting the evaluation of service- dominant business models, taking into account their key characteristics, such as service exchange and value co-creation in business networks. Method: Following a design science research methodology, we have iteratively designed a method addressing the qualitative evaluation of service-dominant business models, building on and integrating the theory on service-dominant logic, business model design and business model evaluation. To structure the steps of the design process, we leverage a situational method engineering approach, following a paradigm-based strategy. To evaluate the validity and utility our method, we have applied it to a real-life business case in the mobility domain, involving eight industry stakeholders in the process. Results: The method constitutes a set of guiding questions and a procedural description of their use, addressing the evaluation concerns of feasibility, viability, structural validity and robustness with respect to the service-dominant business model. The results of the evaluation demonstrate that the use of the method facilitates users to reflect qualitatively on design decision with respect the business model design and offers insights on its expected performance. Conclusions: This work contributes to extant research on service systems engineering and the instantiation of service-dominant logic, clarifying how service ecosystems can be evaluated through the business model concept and explicating how business models are impacted through service-dominant logic

    Concept Design for an Open Mobility Service Platform: UMOS

    Get PDF
    Today, players in mobility form scattered modes while the mobility domain is getting more fragmented. Each provider or ecosystem fulfills core mobility and its complementary services for customers in a silo. For each ecosystem and solution, a user needs a different application and user account. The objective of the UMOS project is to build a pan-European open mobility service platform to offer a one-stop shop for optimized and customized travel experience. This document aims to introduce the concept design of the UMOS platform

    Technical Aspects and Clinical Limitations of Sperm DNA Fragmentation Testing in Male Infertility: A Global Survey, Current Guidelines, and Expert Recommendations

    Get PDF
    PURPOSE: Sperm DNA fragmentation (SDF) is a functional sperm abnormality that can impact reproductive potential, for which four assays have been described in the recently published sixth edition of the WHO laboratory manual for the examination and processing of human semen. The purpose of this study was to examine the global practices related to the use of SDF assays and investigate the barriers and limitations that clinicians face in incorporating these tests into their practice. MATERIALS AND METHODS: Clinicians managing male infertility were invited to complete an online survey on practices related to SDF diagnostic and treatment approaches. Their responses related to the technical aspects of SDF testing, current professional society guidelines, and the literature were used to generate expert recommendations via the Delphi method. Finally, challenges related to SDF that the clinicians encounter in their daily practice were captured. RESULTS: The survey was completed by 436 reproductive clinicians. Overall, terminal deoxynucleotidyl transferase deoxyuridine triphosphate Nick-End Labeling (TUNEL) is the most commonly used assay chosen by 28.6%, followed by the sperm chromatin structure assay (24.1%), and the sperm chromatin dispersion (19.1%). The choice of the assay was largely influenced by availability (70% of respondents). A threshold of 30% was the most selected cut-off value for elevated SDF by 33.7% of clinicians. Of respondents, 53.6% recommend SDF testing after 3 to 5 days of abstinence. Although 75.3% believe SDF testing can provide an explanation for many unknown causes of infertility, the main limiting factors selected by respondents are a lack of professional society guideline recommendations (62.7%) and an absence of globally accepted references for SDF interpretation (50.3%). CONCLUSIONS: This study represents the largest global survey on the technical aspects of SDF testing as well as the barriers encountered by clinicians. Unified global recommendations regarding clinician implementation and standard laboratory interpretation of SDF testing are crucial
    corecore