A survey of timing channels and countermeasures

AK Biswas, D Ghosal, S Nagaraja - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …

A lightweight identity authentication method by exploiting network covert channel

H **e, J Zhao - Peer-to-peer Networking and Applications, 2015 - Springer
The state of art authentication schemes are tightly linked with encryption or crypto systems,
which provides concrete foundations to move towards the concept of access control by …

Secured data transmission over insecure networks-on-chip by modulating inter-packet delays

J Xu, X Wang, Y Jiang, AK Singh, C Gu… - … on Computer-Aided …, 2022 - ieeexplore.ieee.org
As the network-on-chip (NoC) integrated into an SoC design can come from an untrusted
third party, there is a growing risk that data integrity and security get compromised when …

Source authentication techniques for network-on-chip router configuration packets

AK Biswas - ACM Journal on Emerging Technologies in Computing …, 2016 - dl.acm.org
It is known that maliciously configured Network-on-Chip routers can enable an attacker to
launch different attacks inside a Multiprocessor System-on-Chip. A source authentication …

Elimination of the redundancy related to combining algorithms to improve the PDP evaluation performance

F Deng, LY Zhang, BY Zhou… - Mathematical …, 2016 - Wiley Online Library
If there are lots of redundancies in the policies loaded on the policy decision point (PDP) in
the authorization access control model, the system will occupy more resources in operation …

Policy decomposition for evaluation performance improvement of PDP

F Deng, P Chen, LY Zhang, XQ Wang… - Mathematical …, 2014 - Wiley Online Library
In conventional centralized authorization models, the evaluation performance of policy
decision point (PDP) decreases obviously with the growing numbers of rules embodied in a …

A Graph and Clustering-Based Framework for Efficient XACML Policy Evaluation

Y Li, F Deng - International Journal of Cooperative Information …, 2020 - World Scientific
EXtensible Access Control Markup Language (XACML) is one of the standardized
languages for specifying access control policies. Policies described by the XACML are used …