Pivot: Panoramic-Image-Based VR User Authentication against Side-Channel Attacks
Abstract
References
Index Terms
- Pivot: Panoramic-Image-Based VR User Authentication against Side-Channel Attacks
Recommendations
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityModern operating systems use hardware support to protect against control-flow hijacking attacks such as code-injection attacks. Typically, write access to executable pages is prevented and kernel mode execution is restricted to kernel code pages only. ...
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications SecurityMemory encryption is used in many devices to protect memory content from attackers with physical access to a device. However, many current memory encryption schemes can be broken using Differential Power Analysis (DPA). In this work, we present MEAS---...
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
AbstractSide-channels are unintended pathways within target systems that leak internal information, exploitable via side-channel attack techniques that extract the target information, compromising the system’s security and privacy. Side-channel attacks ...
Comments
Information & Contributors
Information
Published In
- Editor:
- Abuabdulmotaleb El Saddik,
- Guest Editorss:
- Yushu Zhang,
- William Puech,
- Anderson Rocha,
- Rongxing Lu,
- Stefano Cresci,
- Roberto Di Pietro
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Natural Science Foundation of China
- US National Science Foundation (NSF)
- Jiangsu Provincial Natural Science Foundation of China
- Jiangsu Provincial Key R&D Programs
- ”Zhishan” Young Scholar Program of Southeast University
- Jiangsu Provincial Key Laboratory of Network and Information Security
- Key Laboratory of Computer Network and Information Integration of Ministry of Education of China
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 117Total Downloads
- Downloads (Last 12 months)117
- Downloads (Last 6 weeks)28
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in