2016 | OriginalPaper | Buchkapitel
1. Introduction
verfasst von : Wen Ming Liu, Lingyu Wang
Erschienen in: Preserving Privacy Against Side-Channel Leaks
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Abstract
-
data publishing (e.g., adversarial knowledge about a generalization algorithm may allow adversaries to potentially infer more sensitive information from the disclosed data);
-
Web-based Application (e.g., exact user inputs can potentially be inferred from the packet sizes even if the traffic between client and server sides is encrypted);
-
smart metering (e.g., the fine-grained meter readings may be used to track the appliance’s usage patterns and consequently sensitive information about the household, such as daily activities or individuals’ habits);
-
cloud computing (e.g., the sharing of physical infrastructure among tenants allows adversaries to extract sensitive information about other tenants’ co-resident VMs);
-
Android smartphone (e.g., per data-usage statistics and speakers’ status may allow an unauthorized application to obtain the smartphone user’s identity, geo-location, or driving routes);
-
VoIP telephony (e.g., users’ conversations can be partially reconstructed from encrypted VoIP packets due to the use of VBR codecs for compression and length-preserving stream ciphers for encryption in VoIP protocols);
-
cryptography (e.g., information about the secret key may be retrieved from the physical characteristics of the cryptographic modules during algorithm execution, such as timing, power consumption, and so on).