July 27, 2023, 1:10 a.m. | Axel Durbet, Paul-Marie Grollemund, Kevin Thiry-Atighehchi

cs.CR updates on arXiv.org arxiv.org

The present paper presents a comprehensive analysis of potential information
leakage in distance evaluation, with a specific emphasis on threshold-based
obfuscated distance (i.e. Fuzzy Matcher). It includes detailed descriptions of
various situations related to potential information leakage and specific
attention is given to their consequences on security. Generic attacks
corresponding to each scenario are outlined, and their complexities are
assessed. The main contribution of this work lies in providing an upper bound
on the security of a fuzzy matcher in …

analysis attacks attention descriptions evaluation information information leakage obfuscated security

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Staff Firmware Engineer – Networking & Firewall

@ Axiado | Bengaluru, India

Compliance Architect / Product Security Sr. Engineer/Expert (f/m/d)

@ SAP | Walldorf, DE, 69190

SAP Security Administrator

@ FARO Technologies | EMEA-Portugal