scholarly journals Air Gap Penetration

Author(s):  
Pooja Mudgil ◽  
Abhishek Raj ◽  
Anmol Biswas ◽  
Ravikant Kumar

The issue of data security is very paramount for any organization now a day So through this project we will show how an attacker can steal data from the air �gapped channels and also provide some measures in order to protect data from such type of attacks. Now a day attackers can leak data from isolated, air-gapped computers to nearby smart phones via covert magnetic signals. Attacks have been demonstrated on eavesdropping computer displays by utilizing these emissions as a side-channel vector. The accuracy of producing a screen pic depends on the emission sampling rate and bandwidth of the attackers signal hardware. The cost of radio frequency hardware increased with supported frequency range and bandwidth. A number of affordable software defined radio equipment solutions are currently available satisfying a number of radio-focused attacks at a proper price point. This work investigates that the accuracy influencing factors, other than the sample rate and bandwidth, which are noise removal, image blending, and image quality adjustments, that affect the perfection of monitor image reconstruction through electromagnetic side-channel attacks.

Author(s):  
Vladislav V. Fomin ◽  
Hanah Zoo ◽  
Heejin Lee

This chapter is aimed at developing a document content analysis method to be applied in studies of standardization and technology development. The proposed method integrates two theoretical frameworks: the co-evolutionary technology development framework and the “D-N-S” (design, negotiation, sense-making) framework for anticipatory standardization. At the backdrop of the complex and diversified landscape of science and R&D efforts in the technology domain, and the repeated criticism of the weak link between R&D initiatives and standardization, the authors argue that the method offered in this chapter helps better understand the internal dynamics of the technology development process at the early stage of standardization or pre-standardization, which, in turn, can help mobilize and direct the R&D initiatives. To demonstrate the practical usefulness of the proposed method, they conduct a content analysis of the research contributions presented in the COST Action IC0905 “Techno-Economic Regulatory Framework for Radio Spectrum Access for Cognitive Radio/ Software Defined Radio” (COST-TERRA).


2018 ◽  
Vol 7 (2.16) ◽  
pp. 88 ◽  
Author(s):  
Latha Sahukar ◽  
Dr M. Madhavi Latha

This paper presents a sampling rate digital down converter that is totally based on frequency domain processing. The proposed DDC is targeted for Software Defined Radio and Cognitive Radio architectures. The proposed architecture is based on replacement of the complex multiplication with direct rotation of the spectrum. Different aspects of frequency domain filtering are also discussed. The Xilinx Virtex-6 family FPGA, XC6VLX240T is used for the implementation and synthesis of the proposed FFT-IFFT based architecture. The overlapping in time domain at the output of the IFFT block is avoided using overlap and add method. In terms area, highly optimized implementation is observed in the proposed architecture when compared to the conventional DDC. The synthesis results have shown that the developed core works at a maximum clock rate of 250 MHz and at the same time  occupies  only 10% of the slices of  FPGA. 


2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Jiazhong Lu ◽  
Xiaolei Liu ◽  
Shibin Zhang ◽  
Yan Chang

The electromagnetic Trojan attack can break through the physical isolation to attack, and the leaked channel does not use the system network resources, which makes the traditional firewall and other intrusion detection devices unable to effectively prevent. Based on the existing research results, this paper proposes an electromagnetic Trojan detection method based on deep learning, which makes the work of electromagnetic Trojan analysis more intelligent. First, the electromagnetic wave signal is captured using software-defined radio technology, and then the signal is initially filtered in combination with a white list, a demodulated signal, and a rate of change in intensity. Secondly, the signal in the frequency domain is divided into blocks in a time-window mode, and the electromagnetic signals are represented by features such as time, information amount, and energy. Finally, the serialized signal feature vector is further extracted using the LSTM algorithm to identify the electromagnetic Trojan. This experiment uses the electromagnetic Trojan data published by Gurion University to test. And it can effectively defend electromagnetic Trojans, improve the participation of computers in electromagnetic Trojan detection, and reduce the cost of manual testing.


Electronics ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 240 ◽  
Author(s):  
Yuanyuan Zhang ◽  
Ning Wu ◽  
Fang Zhou ◽  
Jinbao Zhang ◽  
Muhammad Yahya

Differential power analysis (DPA) is an effective side channel attack method, which poses a critical threat to cryptographic algorithms, especially lightweight ciphers such as SIMON. In this paper, we propose an area-efficient countermeasure against DPA on SIMON based on the power randomization. Firstly, we review and analyze the architecture of SIMON algorithm. Secondly, we prove the threat of DPA attack to SIMON by launching actual DPA attack on SIMON 32/64 circuit. Thirdly, a low-cost power randomization scheme is proposed by combining fault injection with double rate technology, and the corresponding circuit design is implemented. To the best of our knowledge, this is the first scheme that applies the combination of fault injection and double rate technology to the DPA-resistance. Finally, the t-test is used to evaluate the security mechanism of the proposed designs with leakage quantification. Our experimental results show that the proposed design implements DPA-resistance of SIMON algorithm at certain overhead the cost of 47.7% LUTs utilization and 39.6% registers consumption. As compared to threshold implementation and bool mask, the proposed scheme has greater advantages in resource consumption.


Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6747
Author(s):  
Radomir Prodanović ◽  
Dejan Rančić ◽  
Ivan Vulić ◽  
Nenad Zorić ◽  
Dušan Bogićević ◽  
...  

Nowadays, wireless sensor networks (WSN) are widely used in agriculture monitoring to improve the quality and productivity of farming. In this application, sensors gather different types of data (i.e., humidity, carbon dioxide level, and temperature) in real-time scenarios. Thus, data gathering, transmission, and rapid response to new circumstances require a secured data mechanism to avoid malicious adversaries. Therefore, this paper focuses on data security from the data origin source to the end-user, and proposes a general data security model that is independent of the network topology and structure, and can be widely used in the agriculture monitoring application. The developed model considers practical aspects, the architecture of the sensor node, as well as the necessity to save energy while ensuring data security, and optimize the model through the application of organizational and technical measures. The model evaluation is conducted through simulation in terms of energy consumption. The result shows that the proposed model ensures good data security at the cost of a slight increase in energy consumption at receiver and sender nodes, and energy consumption per bit, up to 2%, 7%, and 1.3%, respectively, due to overhead added for authentication in the network.


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Priyanka Kakria ◽  
N. K. Tripathi ◽  
Peerapong Kitipawang

Online telemedicine systems are useful due to the possibility of timely and efficient healthcare services. These systems are based on advanced wireless and wearable sensor technologies. The rapid growth in technology has remarkably enhanced the scope of remote health monitoring systems. In this paper, a real-time heart monitoring system is developed considering the cost, ease of application, accuracy, and data security. The system is conceptualized to provide an interface between the doctor and the patients for two-way communication. The main purpose of this study is to facilitate the remote cardiac patients in getting latest healthcare services which might not be possible otherwise due to low doctor-to-patient ratio. The developed monitoring system is then evaluated for 40 individuals (aged between 18 and 66 years) using wearable sensors while holding an Android device (i.e., smartphone under supervision of the experts). The performance analysis shows that the proposed system is reliable and helpful due to high speed. The analyses showed that the proposed system is convenient and reliable and ensures data security at low cost. In addition, the developed system is equipped to generate warning messages to the doctor and patient under critical circumstances.


2018 ◽  
Vol 8 (2) ◽  
Author(s):  
J. Ryan Martin ◽  
Jesse Otero ◽  
Walter Beaver ◽  
Bryan Springer ◽  
William Griffin

Introduction: There has been recent enthusiasm for the use of modular stemmed tibial components in obese (BMI ≥35kg/m2) patients undergoing primary total knee arthroplasty (TKA). This has been mainly driven by studies demonstrating statistically significant increases in the rates of aseptic tibial loosening (ATL) in this patient population. However, to our knowledge, no study has specifically evaluated the cost effectiveness of this current recommendation.Methods: The following study was performed utilizing previously obtained data on the incidence of ATL in obese patients undergoing primary TKA. This data was then utilized to create a cost calculator that can evaluate the price point at which the use of a stemmed tibial component in all obese patients would be less than or equal to the costs of revision surgery if a stemmed implant was not utilized.Results: Utilizing historical data with a revision rate of 4% for aseptic loosening of the tibia on obese patients, a cost calculator was developed. The cost calculator requires the input of expected or known incidence of ATL utilizing a stem extension and the expected or known costs of revision for ATL.Conclusion: The following cost calculator quickly determines a price point at which the use of a tibial stem offsets the costs of revision surgery. While this study may not provide an exact cost-effectiveness of modular stem fixation due to model limitations, it will hopefully initiate the discussion for providing more cost-effective individualized care for this patient population.


Author(s):  
Alberto Ortolani ◽  
Francesca Caparrini ◽  
Samantha Melani ◽  
Luca Baldini ◽  
Filippo Giannetti

AbstractMeasuring rainfall is complex, due to the high temporal and spatial variability of precipitation, especially in a changing climate, but it is of great importance for all the scientific and operational disciplines dealing with rainfall effects on the environment, human activities, and economy.Microwave (MW) telecommunication links carry information on rainfall rates along their path, through signal attenuation caused by raindrops, and can become measurements of opportunity, offering inexpensive chances to augment information without deploying additional infrastructures, at the cost of some smart processing. Processing satellite telecom signals bring some specific complexities related to the effects of rainfall boundaries, melting layer, and non-weather attenuations, but with the potential to provide worldwide precipitation data with high temporal and spatial samplings. These measurements have to be processed according to the probabilistic nature of the information they carry. An EnKF-based (Ensemble Kalman Filter) method has been developed to dynamically retrieve rainfall fields in gridded domains, which manages such probabilistic information and exploits the high sampling rate of measurements. The paper presents the EnKF method with some representative tests from synthetic 3D experiments. Ancillary data are assumed as from worldwide-available operational meteorological satellites and models, for advection, initial and boundary conditions, rain height. The method reproduces rainfall structures and quantities in a correct way, and also manages possible link outages. It results computationally viable also for operational implementation and applicable to different link observation geometries and characteristics.


2021 ◽  
Author(s):  
I. Moutsopoulos ◽  
L. Maischak ◽  
E. Lauzikaite ◽  
S. A. Vasquez Urbina ◽  
E. C. Williams ◽  
...  

AbstractHigh-throughput sequencing enables an unprecedented resolution in transcript quantification, at the cost of magnifying the impact of technical noise. The consistent reduction of random background noise to capture functionally meaningful biological signals is still challenging. Intrinsic sequencing variability introducing low-level expression variations can obscure patterns in downstream analyses.We introduce noisyR, a comprehensive noise filter to assess the variation in signal distribution and achieve an optimal information-consistency across replicates and samples; this selection also facilitates meaningful pattern recognition outside the background-noise range. noisyR is applicable to count matrices and sequencing data; it outputs sample-specific signal/noise thresholds and filtered expression matrices.We exemplify the effects of minimising technical noise on several datasets, across various sequencing assays: coding, non-coding RNAs and interactions, at bulk and single-cell level. An immediate consequence of filtering out noise is the convergence of predictions (differential-expression calls, enrichment analyses and inference of gene regulatory networks) across different approaches.TeaserNoise removal from sequencing quantification improves the convergence of downstream tools and robustness of conclusions.


Author(s):  
Tianlin Huo ◽  
Xiaoni Meng ◽  
Wenhao Wang ◽  
Chunliang Hao ◽  
Pei Zhao ◽  
...  

Software Guard Extension (SGX) is a hardware-based trusted execution environment (TEE) implemented in recent Intel commodity processors. By isolating the memory of security-critical applications from untrusted software, this mechanism provides users with a strongly shielded environment called enclave for executing programs safely. However, recent studies have demonstrated that SGX enclaves are vulnerable to side-channel attacks. In order to deal with these attacks, several protection techniques have been studied and utilized.In this paper, we explore a new pattern history table (PHT) based side-channel attack against SGX named Bluethunder, which can bypass existing protection techniques and reveal the secret information inside an enclave. Comparing to existing PHT-based attacks (such as Branchscope [ERAG+18]), Bluethunder abuses the 2-level directional predictor in the branch prediction unit, on top of which we develop an exploitation methodology to disclose the input-dependent control flow in an enclave. Since the cost of training the 2-level predictor is pretty low, Bluethunder can achieve a high bandwidth during the attack. We evaluate our attacks on two case studies: extracting the format string information in the vfprintf function in the Intel SGX SDK and attacking the implementation of RSA decryption algorithm in mbed TLS. Both attacks show that Bluethunder can recover fine-grained information inside an enclave with low training overhead, which outperforms the latest PHT-based side channel attack (Branchscope) by 52×. Specifically, in the second attack, Bluethunder can recover the RSA private key with 96.76% accuracy in a single run.


Sign in / Sign up

Export Citation Format

Share Document