Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Two Birds With One Stone: Differential Privacy by Low-Power SRAM Memory
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 6Pages 5706–5719https://doi.org/10.1109/TDSC.2024.3382630The software-based implementation of differential privacy mechanisms has been shown to be neither friendly for lightweight devices nor secure against side-channel attacks. In this work, we aim to develop a hardware-based technique to achieve differential ...
- research-articleNovember 2024
A Secure Two-Factor Authentication Key Exchange Scheme
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 6Pages 5681–5693https://doi.org/10.1109/TDSC.2024.3382359Two-factor authentication key exchange (AKE) is an effective way to strengthen the security of password-authenticated key exchange. Most two-factor AKE schemes using smart cards as the second factor require users to have the second factor with them any ...
- research-articleNovember 2024
Scoring Metrics of Assessing Voiceprint Distinctiveness Based on Speech Content and Rate
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 6Pages 5582–5599https://doi.org/10.1109/TDSC.2024.3380603A voiceprint is the distinctive pattern of human voices widely used for authentication in voice assistants. This article investigates the impact of speech contents and speech rates on the distinctiveness of voiceprint, and has obtained answers to three ...
- research-articleNovember 2024
Message-Driven Generative Music Steganography Using MIDI-GAN
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 6Pages 5196–5207https://doi.org/10.1109/TDSC.2024.3372139Generative steganography has become a popular research topic in the field of generative AI, including generative image and synthetic speech steganography. However, music files have different statistical properties and knowledge representation compared to ...
- research-articleNovember 2024
Analysis of Countermeasures Against Remote and Local Power Side Channel Attacks using Correlation Power Analysis
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 6Pages 5128–5142https://doi.org/10.1109/TDSC.2024.3370711Countermeasures and deterrents to power side-channel attacks targeting the alteration or scrambling of the power delivery network have been shown to be effective against local attacks where the malicious agent has physical access to the target system. ...
-
- research-articleNovember 2024
Trusted Hardware-Assisted Leaderless Byzantine Fault Tolerance Consensus
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 6Pages 5086–5097https://doi.org/10.1109/TDSC.2024.3357521Byzantine Fault Tolerance (BFT) Consensus protocols with trusted hardware assistance have been extensively explored for their improved resilience to tolerate more faulty processes. Nonetheless, the potential of trust hardware has been scarcely ...
- research-articleSeptember 2024
Room-Scale Voice Liveness Detection for Smart Devices
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 5Pages 4982–4996https://doi.org/10.1109/TDSC.2024.3367269Voice assistants are widely integrated into a variety of mobile devices, enabling users to easily complete daily tasks and even critical operations like online transactions with voice commands. Thus, once attackers replay a secretly-recorded voice command ...
- research-articleSeptember 2024
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 5Pages 4574–4588https://doi.org/10.1109/TDSC.2024.3354991Cache side-channel attacks remain a stubborn source of cross-core secret leakage. Such attacks exploit the timing difference between cache hits and misses. Most defenses thus choose to prevent cache evictions. Given that two possible types of evictions&#...
- research-articleJune 2024
Combating Voice Spoofing Attacks on Wearables via Speech Movement Sequences
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 22, Issue 1Pages 819–832https://doi.org/10.1109/TDSC.2024.3418908Voice assistants, increasingly integrated into wearable devices with limited human-computer interaction modalities, are susceptible to voice spoofing attacks. Such attacks exploit pre-recorded or synthesized voice commands to trick the assistants into ...
- research-articleMay 2024
BinBert: Binary Code Understanding With a Fine-Tunable and Execution-Aware Transformer
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 22, Issue 1Pages 308–326https://doi.org/10.1109/TDSC.2024.3397660A recent trend in binary code analysis promotes the use of neural solutions based on instruction embedding models. An instruction embedding model is a neural network that transforms assembly instructions into embedding vectors. If the embedding network is ...
- research-articleMay 2024
FALL: Prior Failure Detection in Large Scale System Based on Language Model
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 22, Issue 1Pages 279–291https://doi.org/10.1109/TDSC.2024.3396166As the scale of high-performance computing systems (HPC) continues to expand, the frequency of failures within the system also increases. The follow-up steps in the event of a failure are necessary because efficient prevention measures are absent. These ...
- research-articleApril 2024
PUF-Based Authentication-Oriented Architecture for Identification Tags
- Antonino Rullo,
- Carmelo Felicetti,
- Massimo Vatalaro,
- Raffaele De Rose,
- Marco Lanuzza,
- Felice Crupi,
- Domenico Saccà
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 22, Issue 1Pages 66–83https://doi.org/10.1109/TDSC.2024.3387568Smart tags are compact electronic devices affixed to or embedded into objects to facilitate identification, monitoring, and data exchange. Consequently, secure authentication of these tags is a crucial issue, as objects must reliably verify their identity ...
- research-articleMarch 2024
Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 2Pages 764–774https://doi.org/10.1109/TDSC.2023.3262040Cooperative jamming (CJ) is a promising technique for enhancing the physical-layer security in wireless powered sensor networks. The secrecy performance of CJ-aided wireless powered sensor networks is affected by three issues including disguised ...
- research-articleJanuary 2024
Generic Soft Error Data and Control Flow Error Detection by Instruction Duplication
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 1Pages 78–92https://doi.org/10.1109/TDSC.2023.3245842Transient faults or soft errors are considered one of the most daunting reliability challenges for microprocessors. Software solutions for soft error protection are attractive because they can provide flexible and effective error protection. For instance, ...
- research-articleNovember 2023
Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 6Pages 4778–4792https://doi.org/10.1109/TDSC.2022.3233862This article proposes a tag-based approach for physical (PHY)-layer authentication in a reconfigurable intelligent surface (RIS) communication system. We first extract the intrinsic PHY-layer features of RIS communication systems in terms of channel gain ...
- research-articleNovember 2023
Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 6Pages 4664–4677https://doi.org/10.1109/TDSC.2022.3231632This study explores data-driven detection of firmware/software Trojans in embedded systems <italic>without</italic> golden models. We consider embedded systems such as single board computers and industrial controllers. While prior literature considers ...
- research-articleNovember 2023
OFIDS : Online Learning-Enabled and Fingerprint-Based Intrusion Detection System in Controller Area Networks
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 6Pages 4607–4620https://doi.org/10.1109/TDSC.2022.3230501As a widely used industrial field bus, the controller area network (CAN) lacks security mechanisms (e.g., encryption and authentication) and is vulnerable to security attacks (e.g., masquerade). A fingerprint-based intrusion detection system (IDS) in CAN ...
- research-articleNovember 2023
NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 6Pages 4455–4473https://doi.org/10.1109/TDSC.2022.3221928Building hardware security primitives with on-device memory fingerprints is a compelling proposition given the ubiquity of memory in electronic devices, especially for low-end Internet of Things devices for which cryptographic modules are often ...
- research-articleJanuary 2022
Characterizing and Exploiting Soft Error Vulnerability Phase Behavior in GPU Applications
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 19, Issue 1Pages 288–300https://doi.org/10.1109/TDSC.2020.2991136System reliability has become a first-class design constraint. As the use of Graphics Processing Units (GPU) continues to increase in compute applications, including High Performance Computing (HPC) and safety-critical applications, so do the number of ...
- research-articleNovember 2021
Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 18, Issue 6Pages 2689–2704https://doi.org/10.1109/TDSC.2019.2961902There has recently been a significant growth in resource-constrained devices (RCDs) that exchange sensitive and private data. Lightweight ciphers are designed to implement confidentiality in RCDs. Hardware implementation of lightweight cipher should ...