PPT-On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces
Author : abel | Published Date : 2024-09-09
Ivan Martinovic Doug Davies Mario Frank Daniele Perito Tomas Ros Dawn Song Presenter Yeongmin Lee Introduction Background Threat Model Experimental Scenarios
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "On the Feasibility of Side-Channel Attac..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces: Transcript
Ivan Martinovic Doug Davies Mario Frank Daniele Perito Tomas Ros Dawn Song Presenter Yeongmin Lee Introduction Background Threat Model Experimental Scenarios Analysis Methodology. Computer Security 2014. Background. An algorithm or software can be designed to be . provably secure. .. E.g. cryptosystems, small OS kernels, TPM modules, .... Involves proving that certain situations cannot arise. virtual machines in . cloud environment. Rohit . Kugaonkar. CMSC 601 Spring 2011. May 9. th. 2011. http://res.sys-con.com/story/dec09/1225058/Cloud%20security%20226.jpg. Cloud Computing. “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”.. Computer Security 2014. Background. An algorithm or software can be designed to be . provably secure. .. E.g. cryptosystems, small OS kernels, TPM modules, .... Involves proving that certain situations cannot arise. Yossi . Oren. , . Ofir. . Weisse. and . Avishai. Wool. HASP Workshop, Tel Aviv, July 2013. 1. Power. Power . Analysis Attacks. Given a . description of a crypto . device. , plaintexts, ciphertexts . VEP-Based Brain-Computer Interfaces: Time, Frequency, and Code Modulationsbrain computer interface (BCI) translates human intentions into control signals to establish a direct commu-nication channel b a. rchitectural. Side-Channel Attacks. Part 2. Yuval Yarom. The University of Adelaide . and . Data61. 1. X86 L1 Cache. Tag. Set. Offset. 0. 6 5. 12 11. Tag,. Data. Sets. Ways. Stores fixed-size (64B) . Yuval Yarom. The University of Adelaide and Data61. “The . binary search needs to be done in constant time to avoid timing issue. But it's fast, so there's no problem. .” . An anonymous reviewer, . Security. Electronic Design Contest - 2017. Outline. Overview . of modern cryptography . Modern hardware design practices. Example of Hardware Attacks. Introduction . to Side Channel . Analysis . Differential . Transcendence . (2014). https://www.youtube.com/watch?v=. 280qnrHpuc8. . Technology Singularity . A hypothetical moment in time when artificial intelligence will have progressed to the point of a greater-than-human intelligence . Team 2. Stephen, Josh, Anna. . & Kristian. Introduction. Our brain is divided into two halves, as most of us know: the left and right side. Each side processes information very differently than the other, and . Dynamic Software Diversity. Presented by . Xianchen. . Meng. Background. Side-Channel Attacks. Definition:. In cryptography, a . side-channel attack. is any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force . Sergio Ruiz, . Korhan. . Buyukturkoglu. , . Mohit. . Rana. , . Niels. . Birbaumer. , & . Ranganatha. . Sitaram. Biological Psychology 95 (2014). Participant. Scanner. Task. Offline. Participant. Yuval Yarom. The University of Adelaide . and . Data61. 1. Publications on . microarchitectural. timing attacks. Data from [GYCH16]. 2. Publications and Global . Temperature. 3. Global Average Temperatures Vs. Number of Pirates. This is the first book on brain-computer interfaces (BCI) that aims to explain how these BCI interfaces can be used for artistic goals. Devices that measure changes in brain activity in various regions of our brain are available and they make it possible to investigate how brain activity is related to experiencing and creating art. Brain activity can also be monitored in order to find out about the affective state of a performer or bystander and use this knowledge to create or adapt an interactive multi-sensorial (audio visual tactile) piece of art. Making use of the measured affective state is just one of the possible ways to use BCI for artistic expression. We can also stimulate brain activity. It can be evoked externally by exposing our brain to external events whether they are visual auditory or tactile. Knowing about the stimuli and the effect on the brain makes it possible to translate such external stimuli to decisions and commands that help to design implement or adapt an artistic performance or interactive installation. Stimulating brain activity can also be done internally. Brain activity can be voluntarily manipulated and changes can be translated into computer commands to realize an artistic vision. The chapters in this book have been written by researchers in human-computer interaction brain-computer interaction neuroscience psychology and social sciences often in cooperation with artists using BCI in their work. It is the perfect book for those seeking to learn about brain-computernbspinterfaces used for artistic applications.
Download Document
Here is the link to download the presentation.
"On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents