Sciweavers

832 search results - page 52 / 167
» Effect of Malicious Synchronization
Sort
View
ICNP
2005
IEEE
14 years 3 months ago
Can coexisting overlays inadvertently step on each other?
By allowing end hosts to make routing decisions at the application level, different overlay networks may unintentionally interfere with each other. This paper describes how multip...
Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluc...
ICRA
2009
IEEE
160views Robotics» more  ICRA 2009»
13 years 7 months ago
SBC for motion assist using neural oscillator
In this paper we propose a framework for synchronization based control (SBC) using neural oscillators for motion assist. A neural oscillator is used to accomplish synchronization a...
Xia Zhang, Minoru Hashimoto
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
14 years 10 months ago
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
Abstract. The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, mal...
Christof Paar, Lang Lin, Markus Kasper, Tim Gü...
ESSOS
2010
Springer
14 years 4 months ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin
APSCC
2008
IEEE
14 years 4 months ago
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Yanguo Liu, Issa Traoré, Alexander M. Hoole