Sciweavers

249 search results - page 22 / 50
» A secure scan design methodology
Sort
View
165
Voted
CCS
2006
ACM
15 years 9 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
DAGSTUHL
2006
15 years 6 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens
156
Voted
GLVLSI
2007
IEEE
107views VLSI» more  GLVLSI 2007»
15 years 11 months ago
Side-channel resistant system-level design flow for public-key cryptography
In this paper, we propose a new design methodology to assess the risk for side-channel attacks, more specifically timing analysis and simple power analysis, at an early design st...
Kazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingr...
140
Voted
CCS
2009
ACM
16 years 4 days ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
105
Voted
HASE
2007
IEEE
15 years 11 months ago
A Mobile Agent-based Multi-Robot Design Method for High-Assurance
During the past several years, the area of robot service and multi-robot has grown rapidly. Since this area is a fusion industry consisting of multiple disciplines, it is lack of ...
Sung-Ook Shin, Jung-Oog Lee, Doo-Kwon Baik