This work was supported in part by the China Ministry of Science and Technology under Grant 2015GA600002。
The cache-based covert channel is one of the common vulnerabilities exploited in the Spectre attacks.Current mitigation strategies focus on blocking the eviction-based channel by using a random/encrypted mapping funct...
the National Nat-ural Science Foundation of China under Grant No.62072406,No.U19B2016,No.U20B2038 and No.61871398;the Natural Science Foundation of Zhejiang Province under Grant No.LY19F020025;the Major Special Funding for“Science and Tech-nology Innovation 2025”in Ningbo under Grant No.2018B10063.
The spectrum sensing model based on deep learning has achieved satisfying detection per-formence,but its robustness has not been verified.In this paper,we propose primary user adversarial attack(PUAA)to verify the rob...
National Natural Science Foundation of China(No.62172308,U1626107,61972297,62172144)。
Cyber-physical systems(CPS)have been widely deployed in critical infrastructures and are vulnerable to various attacks.Data integrity attacks manipulate sensor measurements and cause control systems to fail,which are ...
supported by the National Natural Science Foundation of China under grant No.U1204608,No.61472370,No.61672469 and No.61822701;the National Key R&D Program of China under grant No.2016YFB0800100.
Disk Filtration(DF) Malware can attack air-gapped computers. However, none of the existing technique can detect DF attacks. To address this problem, a method for detecting the DF attacks based on the fourteen Machine ...
supported by the Hebei Province Innovation Capacity Improvement Program of China under Grant No.179676278D;the Ministry of Education Fund Project of China under Grant No.2017A20004
SDN (Software Defined Network) has many security problems, and DDoS attack is undoubtedly the most serious harm to SDN architecture network. How to accurately and effectively detect DDoS attacks has always been a diff...
supported by the National Key Research and Development Program of China (2018YFB0804004);the Foundation of the National Natural Science Foundation of China (61602509);the Foundation for Innovative Research Groups of the National Natural Science Foundation of China (61521003);the Key Technologies Research and Development Program of Henan Province of China (172102210615)
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi...
supported by the National Natural Science Foundation of China (Grant No.61572516, No.61272041 and No.61272488)
AEZ is an AES-based authenticated encryption submitted to the ongoing CAESAR competition and was presented at Eurocrypt2015 with AEZ v3. There are three models for AEZ, AEZ-core, AEZ-tiny and AEZ-prf. In this paper, w...
supported in part by the National Natural Science Foundation of China (Grant No.61202491,61272041,61272488,61402523,61602514);the Science and Technology on Communication Security Laboratory Foundation of China under Grant No.9140C110303140C11051
The Grain v1 stream cipher is one of the seven finalists in the final e STREAM portfolio. Though many attacks have been published,no recovery attack better than exhaustive key search on full Grain v1 in the single key...
supported by the National Natural Science Foundation of China(Grant No.61202387,61332019 and 61373168);the National Basic Research Program of China(“973”Program)(Grant No.2014CB340600)
Defending against return-oriented programing(ROP) attacks is extremely challenging for modern operating systems.As the most popular mobile OS running on ARM,Android is even more vulnerable to ROP attacks due to its we...
supported in part by National Natural Science Foundation of China Project(Grant No.60873216); Scientific and Technological Research Priority Projects of Sichuan Province(Grant No. 2012GZ0017)
The message blinding method is the most efficient and secure countermeasure against first-order differential power analysis(DPA).Although cross correlation attacks(CCAs) were given for defeating message blinding metho...