Sciweavers

1369 search results - page 35 / 274
» A Practical Implementation of the Timing Attack
Sort
View
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
12 years 4 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...
SISW
2003
IEEE
14 years 2 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
TON
2008
75views more  TON 2008»
13 years 8 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
CHES
2006
Springer
205views Cryptology» more  CHES 2006»
14 years 12 days ago
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite thei...
Konrad J. Kulikowski, Alexander B. Smirnov, Alexan...
IJCAI
1993
13 years 10 months ago
Anytime Sensing Planning and Action: A Practical Model for Robot Control
Anytime algorithms, whose quality of results improves gradually as computation time increases, provide useful performance components for timecritical planning and control of robot...
Shlomo Zilberstein, Stuart J. Russell