1. Trang chủ
  2. » Giáo Dục - Đào Tạo

advances in information and computer security 6th international workshop, iwsec 2011, tokyo, japan, november 8-10, 2011 proceedings

244 577 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 244
Dung lượng 3,84 MB

Nội dung

[...]... that necessitated the introduction of the RP) This is achieved by augmenting every memory write instruction within a RP with analysis code that appends an entry in a dynamically expanding array, which holds the address being written and the value being overwritten Because we are using Pin’s instrumentation versioning, only the instructions being reached from within a RP are actually instrumented this way... in receiving threads Since the code that the thread was executing may have already been instrumented, we first remove the code currently executing from the code cache After suppressing the delivery of the signal, Pin attempts to resume execution and since the block of code is no longer present in the code cache, our instrumentation routine is invoked again This allows us to install an analysis routine... which are expressed by continuous distribution, and presented a discrete version in an attempt to reduce the code length and the required memory amount without degrading the traceability T Iwata and M Nishigaki (Eds.): IWSEC 2011, LNCS 7038, pp 1–15, 2011 c Springer-Verlag Berlin Heidelberg 2011 2 M Kuribayashi It is reported in [2] that a correlation sum calculated in a tracing algorithm is expected... signals In Pin’s terms, it allows the instrumentation of the application Additionally, instrumentation routines can modify original code by removing instructions or by more frequently adding new code, referred to as analysis code The instrumented application executes on top of Pin’s virtual machine (VM) runtime, which essentially consists of a just -in- time (JIT) compiler that combines the original and. .. the other hand, the attack strategies are not limited to the above types in a realistic situation such that a codeword is binary and each bit is embedded A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes 5 into one of segments of a digital content without overlapping using a robust watermarking scheme It is reasonable to assume that each bit is embedded ˆ into a segment using an antipodal... actively developed and supports multiple hardware architectures and OSs Pintools can be applied on any supported binary by either launching the binary through Pin or by attaching on an already running binary The latter behavior is highly desirable for REASSURE, as it allows us to deploy RPs without interrupting an already executing application We implemented REASSURE as a Pintool on Linux, but it is by... for generating a RP when an unexpected error occurs, while the second is in charge of applying the produced RP on the application and recovering from future errors 2.1 What Is a Rescue Point? We define a rescue point as a function, preceding and encapsulating code suffering from an fault (i.e., the fault it aims to mend) that contains error handling code, which can be reused to gracefully handle the unexpected... Processing the dumped core can reveal the function containing the fault, which can be frequently used as a RP itself or assist the user to find a nearby RP fit to handle the error 20 G Portokalidis and A.D Keromytis 2.3 Rescue Point Deployment In ASSURE, RPs are deployed using two systems First, Dyninst [4] is employed to inject special code in the beginning of the corresponding function that checkpoints... Author Index 193 210 231 A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes Minoru Kuribayashi Graduate School of Engineering, Kobe University 1-1 Rokkodai-cho, Nada-ku, Kobe, Hyogo, 657-8501 Japan kminoru@kobe-u.ac.jp Abstract The performance of fingerprinting codes has been studied under the well-known marking assumption In a realistic... the Linux OS 3.2 Installing Rescue Points RPs can be installed on any callable application function Such a function can be identified by its name or its address The latter can be useful in cases where a binary has been entirely stripped of symbol information, and as such its functions are only identifiable by their address In systems where the targeted binary is stripped and address space layout randomization . Planck Institute for Informatics, Saarbruecken, Germany

Ngày đăng: 31/05/2014, 00:10

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
4. U.S. Department of Commerce, National Institute of Standards and Technology:Specification for the ADVANCED ENCRYPTION STANDARD (AES) (Federal Information Processing Standards Publication 197) (2001) Sách, tạp chí
Tiêu đề: Specification for the ADVANCED ENCRYPTION STANDARD (AES)
Tác giả: U.S. Department of Commerce, National Institute of Standards and Technology
Nhà XB: Federal Information Processing Standards Publication
Năm: 2001
6. Rijmen, V., Barreto, P.S.L.M.: The WHIRLPOOL hashing function. Submitted to NISSIE (September 2000) Sách, tạp chí
Tiêu đề: The WHIRLPOOL hashing function
Tác giả: Rijmen, V., Barreto, P.S.L.M
Nhà XB: NISSIE
Năm: 2000
7. Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl¨ affer, M., Thomsen, S.S.: Grứstl addendum. Submission to NIST (updated) (2009) Sách, tạp chí
Tiêu đề: Grứstl addendum
Tác giả: Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl¨ affer, M., Thomsen, S.S
Nhà XB: NIST
Năm: 2009
8. Benadjila, R., Billet, O., Gilbert, H., Macario-Rat, G., Peyrin, T., Robshaw, M., Seurin, Y.: SHA-3 proposal: ECHO. Submission to NIST (updated) (2009) 9. Biham, E., Dunkelman, O.: The SHAvite-3 hash function. Submission to NIST(Round 2) (2009) Sách, tạp chí
Tiêu đề: SHA-3 proposal: ECHO
Tác giả: Benadjila, R., Billet, O., Gilbert, H., Macario-Rat, G., Peyrin, T., Robshaw, M., Seurin, Y
Nhà XB: NIST
Năm: 2009
10. Knudsen, L.R., Rijmen, V.: Known-key distinguishers for some block ciphers. In:Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 315–324. Springer, Heidelberg (2007) Sách, tạp chí
Tiêu đề: Known-key distinguishers for some block ciphers
Tác giả: Knudsen, L.R., Rijmen, V
Nhà XB: Springer
Năm: 2007
12. Mendel, F., Peyrin, T., Rechberger, C., Schl¨ affer, M.: Improved cryptanalysis of the reduced Grứstl compression function, ECHO permutation and AES block ci- pher. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 16–35. Springer, Heidelberg (2009) Sách, tạp chí
Tiêu đề: Improved cryptanalysis of the reduced Grứstl compression function, ECHO permutation and AES block cipher
Tác giả: F. Mendel, T. Peyrin, C. Rechberger, M. Schl¨ affer
Nhà XB: Springer
Năm: 2009
13. Gilbert, H., Peyrin, T.: Super-sbox cryptanalysis: Improved attacks for AES-like permutations. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 365–383. Springer, Heidelberg (2010) Sách, tạp chí
Tiêu đề: Super-sbox cryptanalysis: Improved attacks for AES-like permutations
Tác giả: H. Gilbert, T. Peyrin
Nhà XB: Springer
Năm: 2010
16. Naya-Plasencia, M.: Scrutinizing rebound attacks: new algorithms for improving the complexities. Cryptology ePrint Archive, Report 2010/607 (2010),http://eprint.iacr.org/2010/607 Sách, tạp chí
Tiêu đề: Scrutinizing rebound attacks: new algorithms for improving the complexities
Tác giả: María Naya-Plasencia
Nhà XB: Cryptology ePrint Archive
Năm: 2010
19. Peyrin, T.: Improved cryptanalysis of ECHO and Grứstl. Cryptology ePrint Archive, Report 2010/223 (2010), http://eprint.iacr.org/2010/223Full ver- sion of CRYPTO 2010 Sách, tạp chí
Tiêu đề: Improved cryptanalysis of ECHO and Grứstl
Tác giả: Peyrin, T
Nhà XB: Cryptology ePrint Archive
Năm: 2010
5. Daemen, J., Rijmen, V.: The design of Rijndeal: AES – the Advanced Encryption Standard (AES). Springer, Heidelberg (2002) Khác
11. Mendel, F., Rechberger, C., Schl¨ affer, M., Thomsen, S.S.: The rebound attack:Cryptanalysis of reduced whirlpool and Grứstl. In: Dunkelman, O. (ed.) FSE 2009.LNCS, vol. 5665, pp. 260–276. Springer, Heidelberg (2009) Khác
17. Wu, S., Feng, D., Wu, W., Su, B.: Hyper-sbox view of AES-like permutations:A generalized distinguisher. In: Lai, X., Yung, M., Lin, D. (eds.) Inscrypt 2010.LNCS, vol. 6584, pp. 155–168. Springer, Heidelberg (2011) Khác
18. Sasaki, Y., Li, Y., Wang, L., Sakiyama, K., Ohta, K.: Non-full-active super-sbox analysis: Applications to ECHO and grứstl. In: Abe, M. (ed.) ASIACRYPT 2010.LNCS, vol. 6477, pp. 38–55. Springer, Heidelberg (2010) Khác
20. Peyrin, T.: Improved differential attacks for ECHO and Grứstl. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 370–392. Springer, Heidelberg (2010) Khác

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN