10 research outputs found

    SELECTIVE FORWARD ERROR CORRECTION WITH FULL DUPLEX FEEDBACK LOOP

    Get PDF
    Numerous techniques exist for detecting and correcting errors that are introduced during the transmission of information (e.g., a data frame) between two pieces of network equipment, including, for example, forward error correction (FEC), cyclic redundancy check (CRC), hybrid automatic repeat request (HARQ), etc. Use of such techniques carries a cost, often shared between the transmitter and the receiver, comprising increased latency, consumption of bandwidth, the use of computational resources for verification and correction, etc. Techniques are presented herein that support a new method for detecting and correcting errors that leverages a return channel of a bidirectional radio environment to provide a feedback loop through which FEC may be focused just on the areas of a frame that are poorly received, thereby avoiding the latency, bandwidth, etc. costs that would be associated with retransmission of areas of the frame that are well received. The techniques presented herein build on new capabilities of full duplex radios and apply to, for example, Wi-FiÂź 6 and 7 and Third Generation Partnership Project (3GPP) Fifth Generation (5G) networks

    PRESENCE VALIDATION USING SECURED INTERNET PROTOCOL (IP) ADDRESS

    Get PDF
    Various presence-based validation technologies exist that provide for the ability add identity and presence validation to a laptop-based system. However, these technologies are primarily limited to computers (e.g., desktops and laptops) and do not include location validation. There is a need to extend these capabilities to other devices connected to a network and also to eliminate the need for a hardware-assisted solution. There is also a need to offer network location to avoid any type of attack from devices that are not connected to a local area network (LAN) or even to the same port. This proposal provides a technique to ensure that a device/person is present at a location by observing that the device/person performed an activity on-site, which can be observed by a trusted third-party

    ENHANCED NETWORK SLICING FOR INDUSTRIAL AND ENERGY PROTOCOLS

    Get PDF
    With the development of industry 4.0 and the recent evolution of the substation automation, as prescribed at least by the International Electrotechnical Commission (IEC) 61850 Standard, the network is becoming one of the key element of these trends. Network design and network architecture are becoming more and more complex and leading to challenging problems and issues, such as network security, multiplication of unmanaged broadcast domains, and bandwidth limitations. Recent tools have been introduced to help network engineers visualize different industrial Internet of Things (IIoT) protocol flows and characterizations for devices connected to the network. However, visualization is not enough and any help in the design and configuration of the network would be a great differentiator. Techniques herein provide for the ability to utilize sensors to build a network map of industrial and power data flows. The network map can then be used to configure different network slices with guaranteed bandwidth and flow isolation

    Development of novel binary analysis techniques for security applications

    No full text

    Embedded devices security and firmware reverse engineering

    No full text

    Implementation and implications of a stealth hard-drive backdoor

    No full text

    BootKeeper: Validating Software Integrity Properties on Boot Firmware Images

    Get PDF
    International audienceBoot firmware, like UEFI-compliant firmware, has been the target of numerous attacks, giving the attacker control over the entire system while being undetected. The measured boot mechanism of a computer platform ensures its integrity by using cryptographic measurements to detect such attacks. This is typically performed by relying on a Trusted Platform Module (TPM). Recent work, however, shows that vendors do not respect the specifications that have been devised to ensure the integrity of the firmware’s loading process. As a result, attackers may bypass such measurement mechanisms and successfully load a modified firmware image while remaining unnoticed. In this paper we introduce BootKeeper, a static analysis approach verifying a set of key security properties on boot firmware images before deployment, to ensure the integrity of the measured boot process. We evaluate BootKeeper against several attacks on common boot firmware implementations and demonstrate its applicability
    corecore