Security of Ubiquitous Computing Systems : (Record no. 306852)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 10836nam a22004453i 4500 |
001 - CONTROL NUMBER | |
control field | EBC6455781 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240122001313.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 231124s2021 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783030105914 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9783030105907 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC6455781 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL6455781 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1232280332 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Avoine, Gildas. |
245 10 - TITLE STATEMENT | |
Title | Security of Ubiquitous Computing Systems : |
Remainder of title | Selected Topics. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Cham : |
Name of producer, publisher, distributor, manufacturer | Springer International Publishing AG, |
Date of production, publication, distribution, manufacture, or copyright notice | 2021. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | �2021. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (268 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Intro -- Preface -- From the Cryptacus Project to the Cryptacus Book -- Book Contents -- Acknowledgements -- Contents -- Contributors -- Part I Introduction -- 1 Emerging Security Challenges for Ubiquitous Devices -- 1.1 Introduction -- 1.2 Malicious Devices and Watchdog Concept -- 1.2.1 Attacks by Malicious Devices -- 1.2.2 Active Watchdog Concept -- 1.2.3 Solution Strategy -- 1.2.3.1 Commitments: Problems with Solutions Based on Hash Functions -- 1.2.3.2 Commitments Based on Symmetric Encryption -- 1.2.3.3 Encrypted Random Challenge -- 1.2.3.4 Answers to Challenges -- 1.2.3.5 Distance Bounding Protocols -- 1.3 Privacy -- 1.3.1 Symmetric Protocols and Deniability -- 1.3.2 Identity Hiding with Random Key Predistribution -- 1.3.2.1 Key Discovery with a Bloom Filter -- 1.3.2.2 Multiple Shared Keys -- 1.3.2.3 Epoch Keys -- 1.3.3 Overloading Identifiers -- 1.3.4 Pairwise Keys Evolution -- 1.3.5 Transmission with Errors -- 1.4 Conclusion and Future Directions -- Part II Lightweight Cryptographic Primitives -- 2 Catalog and Illustrative Examples of Lightweight Cryptographic Primitives -- 2.1 Introduction -- 2.2 Catalog of Lightweight Cryptographic Primitives -- 2.2.1 Block Ciphers -- 2.2.2 Stream Ciphers -- 2.2.3 Hash Functions -- 2.2.4 Message Authentication Codes -- 2.2.5 Authenticated Encryption Schemes -- 2.3 Illustrative Issues in Security Evaluation of Certain Encryption Schemes -- 2.3.1 Reconsidering TMD Tradeoff Attacks for Lightweight Stream Cipher Designs -- 2.3.2 Guess-and-Determine Based Cryptanalysis Employing Dedicated TMD-TO -- 2.3.2.1 Generic Approach -- 2.3.2.2 Summary of Cryptanalysis of Grain-v1 Employing Guess-and-Determine and Dedicated TMD-TO Approaches -- 3 Selected Design and Analysis Techniques for Contemporary Symmetric Encryption -- 3.1 Introduction -- 3.2 Keystream Generators with Keyed Update Functions. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 3.2.1 Design Approach -- 3.2.2 On Continuously Accessing the Key -- 3.2.3 The Stream Ciphers Sprout and Plantlet -- 3.3 A Generic Attack Against Certain Keystream Generators with Keyed Update Functions -- 3.4 Randomized Encryption Employing Homophonic Coding -- 3.4.1 Background -- 3.4.2 Encryption and Decryption -- 3.4.3 Security Evaluation -- 3.5 Conclusion and Future Directions -- 4 An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families -- 4.1 Introduction -- 4.2 Simon and Speck -- 4.2.1 Simon -- 4.2.2 Speck -- 4.3 Simon and Speck's ``Design Rationale'' -- 4.3.1 Lack of New Information -- 4.3.2 Choice of the Number of Rounds -- 4.3.3 Misquoting Existing Work -- 4.4 The ISO/IEC JTC 1 Standardization Process -- 4.5 The Standardization Process of Simon and Speck in ISO/IEC 29192-2 -- Part III Authentication Protocols -- 5 ePassport and eID Technologies -- 5.1 Application Scenarios -- 5.1.1 Remote vs. Local Use -- 5.1.2 Actors and Scenarios -- 5.1.3 Goals of Protocol Execution -- 5.2 Threats and Security Requirements -- 5.2.1 Assets -- 5.2.2 Threats -- 5.3 Cryptographic Protocols for eIDs -- 5.3.1 Preventing eID Forgeries -- 5.3.2 Enforcing Owner's Consent -- 5.3.3 EID Authentication and Preventing Cloning -- 5.3.4 Authenticating the Terminal and Its Rights -- 5.3.5 Proof of Interaction -- 5.3.6 Passive Tracing -- 5.3.7 Eavesdropping -- Summary -- 5.4 PKI -- 5.5 Challenges for eID Systems -- 5.6 Future Directions -- 6 Ultra-lightweight Authentication -- 6.1 Introduction -- 6.1.1 A Fully Connected World of Small Devices -- 6.1.2 Authentication: Protocol Classification and Physical Constraints -- 6.1.3 Design Challenges -- 6.1.4 Organization of the Chapter -- 6.2 Ultra-lightweight Authentication Protocols -- 6.3 Weaknesses and Pitfalls -- 6.3.1 Poor Diffusion and Linearity -- 6.3.2 Poor Message Composition. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 6.3.3 Biased Output -- 6.3.4 Rotations -- 6.3.5 Vulnerability to Knowledge Accumulation -- 6.3.6 Dubious Proofs of Security: Randomness Tests and Automated Provers -- 6.4 Towards a Sound Approach -- 6.4.1 State of the Literature -- 6.4.2 Promising Avenues -- 6.4.3 The Reductionist Approach -- 6.5 Conclusions -- 7 From Relay Attacks to Distance-Bounding Protocols -- 7.1 An Introduction to Relay Attacks and Distance Bounding -- 7.1.1 Relay Attacks -- 7.1.2 Distance Bounding -- 7.1.3 Other Relay-Countermeasures -- 7.2 Relay Attacks in Practice -- 7.2.1 Basic Relay Strategies -- 7.2.1.1 Purpose-Built Relays -- 7.2.1.2 Off-the-Shelf Relays -- 7.2.2 Advanced Relay Strategies -- 7.2.2.1 Early Send and Late Commit -- 7.2.2.2 Speeding Up the Prover's Response -- 7.3 Canonical Distance-Bounding Protocols -- 7.3.1 General Structure -- 7.3.2 The Hancke-Kuhn Protocol -- 7.3.3 The Brands-Chaum Protocol -- 7.4 Distance-Bounding Threat Model and Its Formal Treatments -- 7.4.1 Main Threat-Model -- 7.4.1.1 Mafia Fraud (MF) [178] -- 7.4.1.2 Distance Fraud (DF) [113] -- 7.4.1.3 Distance Hijacking (DH) [160] -- 7.4.1.4 Terrorist Fraud (TF) [178] -- 7.4.2 Provable Security and Formal Verification -- 7.4.2.1 Symbolic Verification -- 7.4.2.2 Provable Security -- 7.4.2.3 Provably-(in)Secure Protocols -- 7.5 Distance-Bounding Protocols in Practice -- 7.5.1 NXP's Mifare Technology -- 7.5.2 3DB Technology -- 7.5.3 Relay-Resistance in EMV -- 7.6 Current Challenges in Distance Bounding -- 7.6.1 Theory vs. Practice -- 7.6.2 Application-Aware DB -- 7.6.3 Specialist Implementations and Slow Adoption -- Part IV Hardware Implementation and Systems -- 8 It Started with Templates: The Future of Profiling in Side-Channel Analysis -- 8.1 Introduction -- 8.2 Profiled Side-Channel Attacks -- 8.2.1 Definition of Profiling Attacks -- 8.2.2 Data Preprocessing -- 8.2.3 Feature Engineering. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 8.3 Template Attacks -- 8.3.1 Context of Template Attack -- 8.3.2 Standard Template Attack -- 8.3.3 Pooled Template Attack -- 8.3.4 Stochastic Attack -- 8.4 Machine Learning-Based Attacks -- 8.4.1 Conducting Sound Machine Learning Analysis -- 8.5 Performance Metrics -- 8.6 Countermeasures Against SCA -- 8.7 Conclusions -- 9 Side Channel Assessment Platforms and Tools for Ubiquitous Systems -- 9.1 Introduction -- 9.2 Side Channel Attacks, Leakage Assessment Methods and Problems -- 9.2.1 Side Channel Attack Categories -- 9.2.2 Leakage Assessment Using t-Test -- 9.2.3 Practical Considerations in SCA Trace Collection -- 9.3 Side Channel Attack Trace Collection Platforms -- 9.3.1 Proposing a Fast Trace Collection Approach Beyond the Traditional Model -- 9.4 A Use Case of a Flexible and Fast Platform for DUT SCA Evaluation -- 9.5 Conclusions -- 10 Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators -- 10.1 Introduction -- 10.2 Certification, Standards, and Testing -- 10.3 Challenges in Data Collection -- 10.4 Appropriate Selection of Tests -- 10.4.1 Randomness Testing Under Data Collection Constraints: Analyzing the DESFire EV1 -- 10.4.2 Identifying Issues with Quantum Random Number Generators -- 10.5 Conclusion -- 11 Finding Software Bugs in Embedded Devices -- 11.1 The Challenges of Embedded Devices and Software -- 11.1.1 Lack of Transparency -- 11.1.2 Lack of Control -- 11.1.3 Lack of Resistance to Attacks -- 11.1.4 Organization of This Chapter -- 11.1.5 Classification of Embedded Systems -- 11.2 Obtaining Firmware and Its Components -- 11.2.1 Collecting Firmware Packages -- 11.2.2 Extracting Firmware from Devices -- 11.2.3 Unpacking Firmware -- 11.2.4 Firmware Unpacking Frameworks -- 11.2.5 Modifying and Repacking Firmware -- 11.3 Static Firmware Analysis -- 11.3.1 Simple Static Analysis on Firmware Packages. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 11.3.1.1 Configuration Analysis -- 11.3.1.2 Software Version Analysis -- 11.3.2 Static Code Analysis of Firmware Packages -- 11.3.2.1 Code Analysis of Embedded Firmware -- 11.3.2.2 Discovering Backdoors with Static Analysis -- 11.3.2.3 Example Static Analysis to Discover Code Parsers -- 11.4 Dynamic Firmware Analysis -- 11.4.1 Device-Interactive Dynamic Analysis Without Emulation -- 11.4.2 Device-Interactive Dynamic Analysis with Emulation -- 11.4.3 Device-Less Dynamic Analysis and Emulation -- 11.5 Conclusion -- Part V Privacy and Forensics -- 12 Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D Approach -- 12.1 Introduction -- 12.1.1 Goal and Plan of the Chapter -- 12.2 Background and Previous Work on Privacy in UCS -- 12.3 5-D Classification and Analysis of Privacy Risks -- 12.3.1 Identity Privacy -- 12.3.2 Query Privacy -- 12.3.3 Location Privacy -- 12.3.4 Footprint Privacy -- 12.3.5 Intelligence Privacy -- 12.4 Future Trends and Challenges -- 12.4.1 Privacy by Design -- 12.4.2 Individual-Centred Privacy -- 12.4.3 Growing Importance of Legislation -- 12.5 Conclusions -- 13 IoT Forensics -- 13.1 Introduction -- 13.2 Forensics -- 13.2.1 Digital Device Forensics -- 13.2.2 Other Digital Forensics -- 13.2.3 The Need for IoT Forensics -- 13.3 Challenges in IoT Forensics -- 13.3.1 General Issues -- 13.3.2 Evidence Identification, Collection and Preservation -- 13.3.3 Evidence Analysis and Correlation -- 13.3.4 Presentation -- 13.4 Opportunities of IoT Forensics -- 13.5 An Example of an IoT Forensics Case -- 13.6 Research Overview -- 13.6.1 New Models and Frameworks -- 13.6.2 Preparation Step with Repository -- 13.6.3 Real-World Systems -- 13.7 Conclusion and Future Research Directions -- References. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Hernandez-Castro, Julio. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Avoine, Gildas |
Title | Security of Ubiquitous Computing Systems |
Place, publisher, and date of publication | Cham : Springer International Publishing AG,c2021 |
International Standard Book Number | 9783030105907 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=6455781">https://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=6455781</a> |
Public note | Click to View |
No items available.