Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

PDF

Cleveland State University

Theses/Dissertations

Computer security

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Engineering

High Speed Clock Glitching, Santosh Desiraju Jan 2015

High Speed Clock Glitching, Santosh Desiraju

ETD Archive

In recent times, hardware security has drawn a lot of interest in the research community. With physical proximity to the target devices, various fault injection hardware attack methods have been proposed and tested to alter their functionality and trigger behavior not intended by the design. There are various types of faults that can be injected depending on the parameters being used and the level at which the device is tampered with. The literature describes various fault models to inject faults in clock of the target but there are no publications on overclocking circuits for fault injection. The proposed method bridges …


Physical Layer Watermarking Of Direct Sequence Spread Spectrum Signals, Xiang Li Jan 2013

Physical Layer Watermarking Of Direct Sequence Spread Spectrum Signals, Xiang Li

ETD Archive

Security services and mechanisms in wireless networks have long been studied and developed. However, compared to upper network layers, physical layer security did not play a signicant role in the OSI security model. Thanks to the easier implementation and verication methods brought by the development of software dened radio (SDR) techniques, physical layer security mechanisms have recently drawn increasing interest from researchers. Digital watermarking is one of the popular security techniques that can fully utilize various exclusive characteristics of the physical layer. This thesis proposes a physical layer watermarking technique named Water-marked Direct Sequence Spread Spectrum (DSSS) or WDSSS technique, …


A Coding Enabled Anonymity Network, Saikrishna Gumudavally Jan 2012

A Coding Enabled Anonymity Network, Saikrishna Gumudavally

ETD Archive

An onion routing based anonymous communication system is developed to address timing analysis attacks, a common limitation of many contemporary anonymous systems including Tor. Timing analysis based attacks gained importance because simple payload check and packet inspection attacks are avoided by encrypting packets. Timing information gathered at one part of the network is correlated with information gathered at other parts to break the anonymity. Network coding, a recently developed packet forwarding technique, is used to disrupt timing attacks. The system uses a multicast tree of onion routers (OR) through which the packets are relayed to desired destinations. Packets from different …