5 resultados para slide attack
em Indian Institute of Science - Bangalore - Índia
Resumo:
We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.
Resumo:
Grouping and coordination tactics for ground attack missions by a heterogeneous mix of reconnaissance, enemy suppression, and attack unmanned aerial vehicles (UAVs) is presented. Dubins' paths are used to determine the optimal number of attack UAVs and their positional and heading freedoms, as functions of weapon seeker range and field of view. A generic battlefield scenario with layered defense is created and the tactics are evaluated on a Group Flyer simulation platform for both nominal and off-nominal conditions.
Resumo:
Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker's plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.
Stacking Interactions in RNA and DNA: Roll-Slide Energy Hyperspace for Ten Unique Dinucleotide Steps
Resumo:
Understanding dinucleotide sequence directed structures of nuleic acids and their variability from experimental observation remained ineffective due to unavailability of statistically meaningful data. We have attempted to understand this from energy scan along twist, roll, and slide degrees of freedom which are mostly dependent on dinucleotide sequence using ab initio density functional theory. We have carried out stacking energy analysis in these dinucleotide parameter phase space for all ten unique dinucleotide steps in DNA and RNA using DFT-D by B97X-D/6-31G(2d,2p), which appears to satisfactorily explain conformational preferences for AU/AU step in our recent study. We show that values of roll, slide, and twist of most of the dinucleotide sequences in crystal structures fall in the low energy region. The minimum energy regions with large twist values are associated with the roll and slide values of B-DNA, whereas, smaller twist values correspond to higher stability to RNA and A-DNA like conformations. Incorporation of solvent effect by CPCM method could explain the preference shown by some sequences to occur in B-DNA or A-DNA conformations. Conformational preference of BII sub-state in B-DNA is preferentially displayed mainly by pyrimidine-purine steps and partly by purine-purine steps. The purine-pyrimidine steps show largest effect of 5-methyl group of thymine in stacking energy and the introduction of solvent reduces this effect significantly. These predicted structures and variabilities can explain the effect of sequence on DNA and RNA functionality. (c) 2014 Wiley Periodicals, Inc. Biopolymers 103: 134-147, 2015.
Resumo:
The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.