Sciweavers

99 search results - page 12 / 20
» Fault Attacks on Combiners with Memory
Sort
View
ICDCS
1998
IEEE
13 years 11 months ago
Low-Overhead Protocols for Fault-Tolerant File Sharing
In this paper, we quantify the adverse effect of file sharing on the performance of reliable distributed applications. We demonstrate that file sharing incurs significant overhead...
Lorenzo Alvisi, Sriram Rao, Harrick M. Vin
HICSS
2008
IEEE
102views Biometrics» more  HICSS 2008»
14 years 2 months ago
Retrofitting Cyber Physical Systems for Survivability through External Coordination
Most Supervisory Control and Data Acquisition (SCADA) systems have been in operation for decades and they in general have 24x7 availability requirement, hence upgrading or adding ...
Kun Xiao, Shangping Ren, Kevin A. Kwiat
NOSSDAV
2010
Springer
14 years 9 days ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
ISCA
2010
IEEE
170views Hardware» more  ISCA 2010»
14 years 19 days ago
Relax: an architectural framework for software recovery of hardware faults
As technology scales ever further, device unreliability is creating excessive complexity for hardware to maintain the illusion of perfect operation. In this paper, we consider whe...
Marc de Kruijf, Shuou Nomura, Karthikeyan Sankaral...
ICCAD
2008
IEEE
130views Hardware» more  ICCAD 2008»
14 years 4 months ago
Lightweight secure PUFs
— To ensure security and robustness of the next generation of Physically Unclonable Functions (PUFs), we have developed a new methodology for PUF design. Our approach employs int...
Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potk...