90 resultados para Coast side
Resumo:
Side-channel analysis of cryptographic systems can allow for the recovery of secret information by an adversary even where the underlying algorithms have been shown to be provably secure. This is achieved by exploiting the unintentional leakages inherent in the underlying implementation of the algorithm in software or hardware. Within this field of research, a class of attacks known as profiling attacks, or more specifically as used here template attacks, have been shown to be extremely efficient at extracting secret keys. Template attacks assume a strong adversarial model, in that an attacker has an identical device with which to profile the power consumption of various operations. This can then be used to efficiently attack the target device. Inherent in this assumption is that the power consumption across the devices under test is somewhat similar. This central tenet of the attack is largely unexplored in the literature with the research community generally performing the profiling stage on the same device as being attacked. This is beneficial for evaluation or penetration testing as it is essentially the best case scenario for an attacker where the model built during the profiling stage matches exactly that of the target device, however it is not necessarily a reflection on how the attack will work in reality. In this work, a large scale evaluation of this assumption is performed, comparing the key recovery performance across 20 identical smart-cards when performing a profiling attack.
Resumo:
A new homologous series of side-chain liquid crystal polymers, the poly[omega-(4-cyanoazobenzene-4'-oxy)alkyl methacrylate]s, have been prepared in which the length of the flexible alkyl spacer is varied from 3 to 12 methylene units. All the polymers exhibit liquid crystalline behaviour; specifically, crystal E, smectic A and nematic phases are observed. The glass transition temperatures decrease on increasing spacer length before reaching a limiting value at ca. 30 degrees C. The clearing temperatures exhibit an odd-even effect on varying the length and parity of the spacer. This is attributed to the change in the average shape of the side chain as the parity of the spacer is varied. This rationalization also accounts for the observed alternation in the entropy change associated with the clearing transition. A weak relaxation is observed theologically for several members of this polymer series at temperatures above their respective glass transition temperatures. This is attributed either to specific motions of the smectic layers or to 180 degrees reorientational jumps of the long axis of the mesogenic unit about the polymer backbone. (C) 1997 Elsevier Science Ltd. All rights reserved.
Resumo:
In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.
Resumo:
This paper presents a new methodology for characterising the energy performance of buildings suitable for city-scale, top-down energy modelling. Building properties that have the greatest impact on simulated energy performance were identified via a review of sensitivity analysis studies. The methodology greatly simplifies the description of a building to decrease labour and simulation processing overheads. The methodology will be used in the EU FP7 INDICATE project which aims to create a master-planning tool that uses dynamic simulation to facilitate the design of sustainable, energy efficient smart cities.
Resumo:
Invasive species are often more able to rapidly and efficiently utilise resources than natives, and comparing per capita resource use at different resource densities among invaders and trophically analogous natives could allow for reliable predictions of invasiveness. In South Africa, invasion by the Mediterranean mussel Mytilus galloprovincialis has transformed wave-exposed shores, negatively affecting native mussel species. Currently, South Africa is experiencing a second mussel invasion with the recent detection of the South American Semimytilus algosus. We tested per capita uptake of an algal resource by invading M. galloprovincialis, S. algosus, and the native Aulacomya atra at different algal concentrations and temperatures, representing the west and south coasts of South Africa, to examine whether their per capita resource use could be a predictor of their spread and subsequent invasiveness. Regardless of temperature, M. galloprovincialis was the most efficient consumer, significantly reducing algal cells compared to the other species when the resource was presented in both low and high starting densities. Furthermore, these findings aligned with a greater biomass of M. galloprovincialis on the shore in comparison with the other species. Resource use by the new invader S. algosus was dependent on the density of resource and, although this species was efficient at low algal concentrations at cooler temperatures, this pattern broke down at higher algal densities. This was once more reflected in lower biomass in surveys of this species along the cool west coast. We therefore forecast that S. algosus will be become established along the south coast; however, we also predict that M. galloprovincialis will maintain dominance on these shores.
Resumo:
The interaction between problematic geology and environmental variables along the Antrim Coast Road results in frequent instances of geotechnical instability. During such instances of instability, mudslide debris encroaches on the carriageway posing a hazard to motorists, causing lengthily tailbacks. This paper examines some of the geotechnical and spatial analysis techniques currently being implemented to monitor slope stability on this key transport route.
Resumo:
Demand Side Management (DSM) plays an important role in Smart Grid. It has large scale access points, massive users, heterogeneous infrastructure and dispersive participants. Moreover, cloud computing which is a service model is characterized by resource on-demand, high reliability and large scale integration and so on and the game theory is a useful tool to the dynamic economic phenomena. In this study, a scheme design of cloud + end technology is proposed to solve technical and economic problems of the DSM. The architecture of cloud + end is designed to solve technical problems in the DSM. In particular, a construct model of cloud + end is presented to solve economic problems in the DSM based on game theories. The proposed method is tested on a DSM cloud + end public service system construction in a city of southern China. The results demonstrate the feasibility of these integrated solutions which can provide a reference for the popularization and application of the DSM in china.
Resumo:
Libertarian paternalism, as advanced by Cass Sunstein, is seriously flawed, but not primarily for the reasons that most commentators suggest. Libertarian paternalism and its attendant regulatory implications are too libertarian, not too paternalistic, and as a result are in considerable tension with ‘thick’ conceptions of human dignity. We make four arguments. The first is that there is no justification for a presumption in favor of nudging as a default regulatory strategy, as Sunstein asserts. It is ordinarily less effective than mandates; such mandates rarely offend personal autonomy; and the central reliance on cognitive failures in the nudging program is more likely to offend human dignity than the mandates it seeks to replace. Secondly, we argue that nudging as a regulatory strategy fits both overtly and covertly, often insidiously, into a more general libertarian program of political economy. Thirdly, while we are on the whole more concerned to reject the libertarian than the paternalistic elements of this philosophy, Sunstein’s work, both in Why Nudge?, and earlier, fails to appreciate how nudging may be manipulative if not designed with more care than he acknowledges. Lastly, because of these characteristics, nudging might even be subject to legal challenges that would give us the worst of all possible regulatory worlds: a weak regulatory intervention that is liable to be challenged in the courts by well-resourced interest groups. In such a scenario, and contrary to the ‘common sense’ ethos contended for in Why Nudge?, nudges might not even clear the excessively low bar of doing something rather than nothing. Those seeking to pursue progressive politics, under law, should reject nudging in favor of regulation that is more congruent with principles of legality, more transparent, more effective, more democratic, and allows us more fully to act as moral agents. Such a system may have a place for (some) nudging, but not one that departs significantly from how labeling, warnings and the like already function, and nothing that compares with Sunstein’s apparent ambitions for his new movement.
Resumo:
A podcast of a talk presented at a conference in Berlin organized by the Vervassungsblog on Choice Architecture in Democracies, in January 2015 - Verfassungsblog - Autonomy vs. Technocracy: Libertarian Paternalism revisited
Resumo:
There is lack of consistent evidence as to how well PD patients are able to accurately time their movements across space with an external acoustic signal. For years, research based on the finger-tapping paradigm, the most popular paradigm for exploring the brain's ability to time movement, has provided strong evidence that patients are not able to accurately reproduce an isochronous interval [i.e., Ref. (1)]. This was undermined by Spencer and Ivry (2) who suggested a specific deficit in temporal control linked to emergent, rhythmical movement not event-based actions, which primarily involve the cerebellum. In this study, we investigated motor timing of seven idiopathic PD participants in event-based sensorimotor synchronization task. Participants were asked to move their finger horizontally between two predefined target zones to synchronize with the occurrence of two sound events at two time intervals (1.5 and 2.5 s). The width of the targets and the distance between them were manipulated to investigate impact of accuracy demands and movement amplitude on timing performance. The results showed that participants with PD demonstrated specific difficulties when trying to accurately synchronize their movements to a beat. The extent to which their ability to synchronize movement was compromised was found to be related to the severity of PD, but independent of the spatial constraints of the task.
Resumo:
Cryptographic algorithms have been designed to be computationally secure, however it has been shown that when they are implemented in hardware, that these devices leak side channel information that can be used to mount an attack that recovers the secret encryption key. In this paper an overlapping window power spectral density (PSD) side channel attack, targeting an FPGA device running the Advanced Encryption Standard is proposed. This improves upon previous research into PSD attacks by reducing the amount of pre-processing (effort) required. It is shown that the proposed overlapping window method requires less processing effort than that of using a sliding window approach, whilst overcoming the issues of sampling boundaries. The method is shown to be effective for both aligned and misaligned data sets and is therefore recommended as an improved approach in comparison with existing time domain based correlation attacks.