Sciweavers

8177 search results - page 9 / 1636
» Detecting System Emulators
Sort
View
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
14 years 20 days ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
CCR
2010
96views more  CCR 2010»
13 years 9 months ago
Dummynet revisited
Dummynet is a widely used link emulator, developed long ago to run experiments in user-configurable network environments. Since its original design, Dummynet has been extended in ...
Marta Carbone, Luigi Rizzo
MASCOTS
2003
13 years 10 months ago
Toward Scaling Network Emulation using Topology Partitioning
Scalability is the primary challenge to studying large complex network systems with network emulation. This paper studies topology partitioning, assigning disjoint pieces of the n...
Ken Yocum, Ethan Eade, Julius Degesys, David Becke...
CSREAESA
2009
13 years 10 months ago
Embedded Processor Based Fault Injection and SEU Emulation for FPGAs
Two embedded processor based fault injection case studies are presented which are applicable to Field Programmable Gate Arrays (FPGAs) and FPGA cores in configurable System-on-Chip...
Bradley F. Dutton, Mustafa Ali, Charles E. Stroud,...