Jamming-Resistant Encoding for Non-Uniformly Distributed Information

Slide Note
Embed
Share

Protect systems against jamming with efficient encoding methods based on keystroke frequency distribution. Attacker profiles and assumptions analyzed. Approaches considered include algebraic manipulation detection codes and level-out codes. Initial results show promise in reducing error masking probability for weaker attackers. Ongoing research focuses on AMD codes and remapping applications.


Uploaded on Nov 20, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Jamming Resistant Encoding for Non-Uniformly Distributed Information Batya Karp, Yerucham Berkowitz Advisor: Dr. Osnat Keren

  2. Motivation Protect the system against jamming Platform Keyboard Standard defense against weak attackers or strong attackers with uniform probability ?|? ?,?+? ? Error masking probability: ? = max ? ? = ? Encoding layer should be efficient (quicker, fewer redundancy bits) Keystroke Frequency Based on 5 users / 300,000 keystrokes 14 12 Frequency (%) 10 8 6 4 2 0 a c e g i k m o q s u w y space Keys

  3. Attacker Profiles M set of information words C set of code words Attacker Assumptions the attacker knows: Attacker s Goal ????? ? ? ,? ? ? = ? ? + ? ?\{?(?)} ? = ? ? + ? ??? ? ??? ??? = ? ? ????? ???? ??? ? ? ,? ? ? ???? ???? ?} ? ? | ?0,..,? 1, ? ? | ?0,..,? 1 ?????? ? = ? ? + ?(?0,..,? 1) ?\{?(?)}

  4. Approaches we considered Algebraic Manipulation Detection codes (Cramer, Dodis, Fehr, Padro, and Wichs, 2008) Remapping + Robust code (Shumsky and Keren, 2015) Level-Out codes + Robust code Current Status Formalization of the problem + efficiency criteria Literature survey ongoing Keylogging statistics ongoing, preliminary statistics obtained Preliminary results: Blind attacker applying Level-out code shows significant improvement (~28% to 5% max error masking probability!) Next Steps Level-out codes only applicable to weaker attackers Researching and simulating applications of AMD codes and remapping.

Related


More Related Content