1,859 research outputs found

    Design study of time-preserving grating monochromators for ultrashort pulses in the extreme-ultraviolet and soft X-rays

    Get PDF
    The design of grating-based instruments to handle and condition coherent ultrafast pulses in the extreme-ultraviolet is discussed. The main application of such instruments is the monochromatization of high-order laser harmonics and free-electron-laser pulses in the femtosecond time scale. Broad-band monochromators require the use of diffraction gratings at grazing incidence. A grating can be used for the spectral selection of ultrashort pulses without altering the pulse duration in a significant way, provided that the number of illuminated grooves is equal to the resolution. We discuss here the design conditions to be fulfilled by a grating monochromator that does not increase the pulse duration significantly longer than the Fourier limit

    Compression of extreme-ultraviolet ultrashort pulses by grating configurations

    Get PDF
    The design and realization of grating instruments to condition the spectral phase of ultrashort extreme-ultraviolet pulses are discussed. The main application of such configurations is the temporal compression of pulses by compensating the phase chirp and getting close to the Fourier limit. We discuss the two configurations useful for the realization of ultrafast grating compressors, namely, the classical diffraction mount and the off-plane one. The configuration may be applied to free-electron lasers and high-order laser harmonics

    DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization

    Full text link
    Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-channel attacks. In a common attack, the adversary monitors CPU caches to infer secret-dependent data accesses patterns. Known defenses have major limitations, as they require either error-prone developer assistance, incur extremely high runtime overhead, or prevent only specific attacks. In this paper, we propose data location randomization as a novel defense against side-channel attacks that target data access patterns. Our goal is to break the link between the memory observations by the adversary and the actual data accesses by the victim. We design and implement a compiler-based tool called DR.SGX that instruments the enclave code, permuting data locations at fine granularity. To prevent correlation of repeated memory accesses we periodically re-randomize all enclave data. Our solution requires no developer assistance and strikes the balance between side-channel protection and performance based on an adjustable security parameter

    Evaluating software-based fingerprint liveness detection using Convolutional Networks and Local Binary Patterns

    Full text link
    With the growing use of biometric authentication systems in the past years, spoof fingerprint detection has become increasingly important. In this work, we implement and evaluate two different feature extraction techniques for software-based fingerprint liveness detection: Convolutional Networks with random weights and Local Binary Patterns. Both techniques were used in conjunction with a Support Vector Machine (SVM) classifier. Dataset Augmentation was used to increase classifier's performance and a variety of preprocessing operations were tested, such as frequency filtering, contrast equalization, and region of interest filtering. The experiments were made on the datasets used in The Liveness Detection Competition of years 2009, 2011 and 2013, which comprise almost 50,000 real and fake fingerprints' images. Our best method achieves an overall rate of 95.2% of correctly classified samples - an improvement of 35% in test error when compared with the best previously published results.Comment: arXiv admin note: text overlap with arXiv:1301.3557 by other author

    IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

    Full text link
    With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing networks where the presence of such vulnerable devices is given, requires a brownfield approach: applying necessary protection measures within the network so that potentially vulnerable devices can coexist without endangering the security of other devices in the same network. In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. We show that IOT SENTINEL is effective in identifying device types and has minimal performance overhead
    corecore