Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Pieter Robyns"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 1 (2018)
Sensitive cryptographic information, e.g. AES secret keys, can be extracted from the electromagnetic (EM) leakages unintentionally emitted by a device using techniques such as Correlation Electromagnetic Analysis (CEMA). In this paper, we introduce C
Externí odkaz:
https://doaj.org/article/03a61637504c4be68199f31bce7794b9
Publikováno v:
WISEC
Determining which operations are being executed by a black-box device is an important challenge to tackle in reverse engineering. Furthermore, in order to perform a successful side-channel analysis (SCA) of said operations, their precise timing must
Publikováno v:
WEBIST
Publikováno v:
IoTBDS
LoRa is a recently introduced modulation scheme specifically designed for Low-Power Wide-Area Networks. In this paper, we provide the first detailed and complete description of the LoRa PHY layer, and present a novel methodology for detecting and dec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e8a3d5b46f8c2b4ee98c2e4e6ee4f4ed
http://hdl.handle.net/1942/25865
http://hdl.handle.net/1942/25865
Publikováno v:
WISEC
In recent works, numerous physical-layer security systems have been proposed as alternatives to classic cryptography. Such systems aim to use the intrinsic properties of radio signals and the wireless medium to provide confidentiality and authenticat
Publikováno v:
WISEC
from radio signals can be used to uniquely identify devices. This paper proposes and analyses a novel methodology to fingerprint LoRa devices, which is inspired by recent advances in supervised machine learning and zero-shot image classification. Con
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cb7b8311445c622562f4794030c49978
http://hdl.handle.net/1942/24046
http://hdl.handle.net/1942/24046
Publikováno v:
Security and Communication Networks, Vol 2017 (2017)
We present two novel noncooperative MAC layer fingerprinting and tracking techniques for Wi-Fi (802.11) enabled mobile devices. Our first technique demonstrates how a per-bit entropy analysis of a single captured frame allows an adversary to construc
Publikováno v:
WISEC
Wicability is an open platform created for researchers, that aims to provide insights into the spatial and temporal impact of both novel and past 802.11 security vulnerabilities. This is achieved through the automated collection and analysis of large
Publikováno v:
WISEC
The ability to inject packets into a network is known to be an important tool for attackers: it allows them to exploit or probe for potential vulnerabilities residing on the connected hosts. In this paper, we present a novel practical methodology for
Publikováno v:
WISEC
Many of today's enterprise-scale wireless networks are protected by the WPA2-Enterprise Protected Extensible Authentication Protocol (PEAP). In this paper it is demonstrated how an attacker can steal a user's credentials and gain unauthorized access