Security of Ubiquitous Computing Systems : (Record no. 306852)

MARC details
000 -LEADER
fixed length control field 10836nam a22004453i 4500
001 - CONTROL NUMBER
control field EBC6455781
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240122001313.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231124s2021 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030105914
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9783030105907
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC6455781
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL6455781
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1232280332
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Avoine, Gildas.
245 10 - TITLE STATEMENT
Title Security of Ubiquitous Computing Systems :
Remainder of title Selected Topics.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham :
Name of producer, publisher, distributor, manufacturer Springer International Publishing AG,
Date of production, publication, distribution, manufacture, or copyright notice 2021.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice �2021.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (268 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Intro -- Preface -- From the Cryptacus Project to the Cryptacus Book -- Book Contents -- Acknowledgements -- Contents -- Contributors -- Part I Introduction -- 1 Emerging Security Challenges for Ubiquitous Devices -- 1.1 Introduction -- 1.2 Malicious Devices and Watchdog Concept -- 1.2.1 Attacks by Malicious Devices -- 1.2.2 Active Watchdog Concept -- 1.2.3 Solution Strategy -- 1.2.3.1 Commitments: Problems with Solutions Based on Hash Functions -- 1.2.3.2 Commitments Based on Symmetric Encryption -- 1.2.3.3 Encrypted Random Challenge -- 1.2.3.4 Answers to Challenges -- 1.2.3.5 Distance Bounding Protocols -- 1.3 Privacy -- 1.3.1 Symmetric Protocols and Deniability -- 1.3.2 Identity Hiding with Random Key Predistribution -- 1.3.2.1 Key Discovery with a Bloom Filter -- 1.3.2.2 Multiple Shared Keys -- 1.3.2.3 Epoch Keys -- 1.3.3 Overloading Identifiers -- 1.3.4 Pairwise Keys Evolution -- 1.3.5 Transmission with Errors -- 1.4 Conclusion and Future Directions -- Part II Lightweight Cryptographic Primitives -- 2 Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- 2.1 Introduction -- 2.2 Catalog of Lightweight Cryptographic Primitives -- 2.2.1 Block Ciphers -- 2.2.2 Stream Ciphers -- 2.2.3 Hash Functions -- 2.2.4 Message Authentication Codes -- 2.2.5 Authenticated Encryption Schemes -- 2.3 Illustrative Issues in Security Evaluation of Certain Encryption Schemes -- 2.3.1 Reconsidering TMD Tradeoff Attacks for Lightweight Stream Cipher Designs -- 2.3.2 Guess-and-Determine Based Cryptanalysis Employing Dedicated TMD-TO -- 2.3.2.1 Generic Approach -- 2.3.2.2 Summary of Cryptanalysis of Grain-v1 Employing Guess-and-Determine and Dedicated TMD-TO Approaches -- 3 Selected Design and Analysis Techniques for Contemporary Symmetric Encryption -- 3.1 Introduction -- 3.2 Keystream Generators with Keyed Update Functions.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.2.1 Design Approach -- 3.2.2 On Continuously Accessing the Key -- 3.2.3 The Stream Ciphers Sprout and Plantlet -- 3.3 A Generic Attack Against Certain Keystream Generators with Keyed Update Functions -- 3.4 Randomized Encryption Employing Homophonic Coding -- 3.4.1 Background -- 3.4.2 Encryption and Decryption -- 3.4.3 Security Evaluation -- 3.5 Conclusion and Future Directions -- 4 An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- 4.1 Introduction -- 4.2 Simon and Speck -- 4.2.1 Simon -- 4.2.2 Speck -- 4.3 Simon and Speck's ``Design Rationale'' -- 4.3.1 Lack of New Information -- 4.3.2 Choice of the Number of Rounds -- 4.3.3 Misquoting Existing Work -- 4.4 The ISO/IEC JTC 1 Standardization Process -- 4.5 The Standardization Process of Simon and Speck in ISO/IEC 29192-2 -- Part III Authentication Protocols -- 5 ePassport and eID Technologies -- 5.1 Application Scenarios -- 5.1.1 Remote vs. Local Use -- 5.1.2 Actors and Scenarios -- 5.1.3 Goals of Protocol Execution -- 5.2 Threats and Security Requirements -- 5.2.1 Assets -- 5.2.2 Threats -- 5.3 Cryptographic Protocols for eIDs -- 5.3.1 Preventing eID Forgeries -- 5.3.2 Enforcing Owner's Consent -- 5.3.3 EID Authentication and Preventing Cloning -- 5.3.4 Authenticating the Terminal and Its Rights -- 5.3.5 Proof of Interaction -- 5.3.6 Passive Tracing -- 5.3.7 Eavesdropping -- Summary -- 5.4 PKI -- 5.5 Challenges for eID Systems -- 5.6 Future Directions -- 6 Ultra-lightweight Authentication -- 6.1 Introduction -- 6.1.1 A Fully Connected World of Small Devices -- 6.1.2 Authentication: Protocol Classification and Physical Constraints -- 6.1.3 Design Challenges -- 6.1.4 Organization of the Chapter -- 6.2 Ultra-lightweight Authentication Protocols -- 6.3 Weaknesses and Pitfalls -- 6.3.1 Poor Diffusion and Linearity -- 6.3.2 Poor Message Composition.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6.3.3 Biased Output -- 6.3.4 Rotations -- 6.3.5 Vulnerability to Knowledge Accumulation -- 6.3.6 Dubious Proofs of Security: Randomness Tests and Automated Provers -- 6.4 Towards a Sound Approach -- 6.4.1 State of the Literature -- 6.4.2 Promising Avenues -- 6.4.3 The Reductionist Approach -- 6.5 Conclusions -- 7 From Relay Attacks to Distance-Bounding Protocols -- 7.1 An Introduction to Relay Attacks and Distance Bounding -- 7.1.1 Relay Attacks -- 7.1.2 Distance Bounding -- 7.1.3 Other Relay-Countermeasures -- 7.2 Relay Attacks in Practice -- 7.2.1 Basic Relay Strategies -- 7.2.1.1 Purpose-Built Relays -- 7.2.1.2 Off-the-Shelf Relays -- 7.2.2 Advanced Relay Strategies -- 7.2.2.1 Early Send and Late Commit -- 7.2.2.2 Speeding Up the Prover's Response -- 7.3 Canonical Distance-Bounding Protocols -- 7.3.1 General Structure -- 7.3.2 The Hancke-Kuhn Protocol -- 7.3.3 The Brands-Chaum Protocol -- 7.4 Distance-Bounding Threat Model and Its Formal Treatments -- 7.4.1 Main Threat-Model -- 7.4.1.1 Mafia Fraud (MF) [178] -- 7.4.1.2 Distance Fraud (DF) [113] -- 7.4.1.3 Distance Hijacking (DH) [160] -- 7.4.1.4 Terrorist Fraud (TF) [178] -- 7.4.2 Provable Security and Formal Verification -- 7.4.2.1 Symbolic Verification -- 7.4.2.2 Provable Security -- 7.4.2.3 Provably-(in)Secure Protocols -- 7.5 Distance-Bounding Protocols in Practice -- 7.5.1 NXP's Mifare Technology -- 7.5.2 3DB Technology -- 7.5.3 Relay-Resistance in EMV -- 7.6 Current Challenges in Distance Bounding -- 7.6.1 Theory vs. Practice -- 7.6.2 Application-Aware DB -- 7.6.3 Specialist Implementations and Slow Adoption -- Part IV Hardware Implementation and Systems -- 8 It Started with Templates: The Future of Profiling in Side-Channel Analysis -- 8.1 Introduction -- 8.2 Profiled Side-Channel Attacks -- 8.2.1 Definition of Profiling Attacks -- 8.2.2 Data Preprocessing -- 8.2.3 Feature Engineering.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 8.3 Template Attacks -- 8.3.1 Context of Template Attack -- 8.3.2 Standard Template Attack -- 8.3.3 Pooled Template Attack -- 8.3.4 Stochastic Attack -- 8.4 Machine Learning-Based Attacks -- 8.4.1 Conducting Sound Machine Learning Analysis -- 8.5 Performance Metrics -- 8.6 Countermeasures Against SCA -- 8.7 Conclusions -- 9 Side Channel Assessment Platforms and Tools for Ubiquitous Systems -- 9.1 Introduction -- 9.2 Side Channel Attacks, Leakage Assessment Methods and Problems -- 9.2.1 Side Channel Attack Categories -- 9.2.2 Leakage Assessment Using t-Test -- 9.2.3 Practical Considerations in SCA Trace Collection -- 9.3 Side Channel Attack Trace Collection Platforms -- 9.3.1 Proposing a Fast Trace Collection Approach Beyond the Traditional Model -- 9.4 A Use Case of a Flexible and Fast Platform for DUT SCA Evaluation -- 9.5 Conclusions -- 10 Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators -- 10.1 Introduction -- 10.2 Certification, Standards, and Testing -- 10.3 Challenges in Data Collection -- 10.4 Appropriate Selection of Tests -- 10.4.1 Randomness Testing Under Data Collection Constraints: Analyzing the DESFire EV1 -- 10.4.2 Identifying Issues with Quantum Random Number Generators -- 10.5 Conclusion -- 11 Finding Software Bugs in Embedded Devices -- 11.1 The Challenges of Embedded Devices and Software -- 11.1.1 Lack of Transparency -- 11.1.2 Lack of Control -- 11.1.3 Lack of Resistance to Attacks -- 11.1.4 Organization of This Chapter -- 11.1.5 Classification of Embedded Systems -- 11.2 Obtaining Firmware and Its Components -- 11.2.1 Collecting Firmware Packages -- 11.2.2 Extracting Firmware from Devices -- 11.2.3 Unpacking Firmware -- 11.2.4 Firmware Unpacking Frameworks -- 11.2.5 Modifying and Repacking Firmware -- 11.3 Static Firmware Analysis -- 11.3.1 Simple Static Analysis on Firmware Packages.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 11.3.1.1 Configuration Analysis -- 11.3.1.2 Software Version Analysis -- 11.3.2 Static Code Analysis of Firmware Packages -- 11.3.2.1 Code Analysis of Embedded Firmware -- 11.3.2.2 Discovering Backdoors with Static Analysis -- 11.3.2.3 Example Static Analysis to Discover Code Parsers -- 11.4 Dynamic Firmware Analysis -- 11.4.1 Device-Interactive Dynamic Analysis Without Emulation -- 11.4.2 Device-Interactive Dynamic Analysis with Emulation -- 11.4.3 Device-Less Dynamic Analysis and Emulation -- 11.5 Conclusion -- Part V Privacy and Forensics -- 12 Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- 12.1 Introduction -- 12.1.1 Goal and Plan of the Chapter -- 12.2 Background and Previous Work on Privacy in UCS -- 12.3 5-D Classification and Analysis of Privacy Risks -- 12.3.1 Identity Privacy -- 12.3.2 Query Privacy -- 12.3.3 Location Privacy -- 12.3.4 Footprint Privacy -- 12.3.5 Intelligence Privacy -- 12.4 Future Trends and Challenges -- 12.4.1 Privacy by Design -- 12.4.2 Individual-Centred Privacy -- 12.4.3 Growing Importance of Legislation -- 12.5 Conclusions -- 13 IoT Forensics -- 13.1 Introduction -- 13.2 Forensics -- 13.2.1 Digital Device Forensics -- 13.2.2 Other Digital Forensics -- 13.2.3 The Need for IoT Forensics -- 13.3 Challenges in IoT Forensics -- 13.3.1 General Issues -- 13.3.2 Evidence Identification, Collection and Preservation -- 13.3.3 Evidence Analysis and Correlation -- 13.3.4 Presentation -- 13.4 Opportunities of IoT Forensics -- 13.5 An Example of an IoT Forensics Case -- 13.6 Research Overview -- 13.6.1 New Models and Frameworks -- 13.6.2 Preparation Step with Repository -- 13.6.3 Real-World Systems -- 13.7 Conclusion and Future Research Directions -- References.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hernandez-Castro, Julio.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Avoine, Gildas
Title Security of Ubiquitous Computing Systems
Place, publisher, and date of publication Cham : Springer International Publishing AG,c2021
International Standard Book Number 9783030105907
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=6455781">https://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=6455781</a>
Public note Click to View

No items available.