Sciweavers

127 search results - page 13 / 26
» Quantifying information leaks in software
Sort
View
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
14 years 2 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
ASPLOS
2006
ACM
14 years 2 months ago
Introspective 3D chips
While the number of transistors on a chip increases exponentially over time, the productivity that can be realized from these systems has not kept pace. To deal with the complexit...
Shashidhar Mysore, Banit Agrawal, Navin Srivastava...
CCS
2008
ACM
13 years 10 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...
TASLP
2011
13 years 3 months ago
On the Information Geometry of Audio Streams With Applications to Similarity Computing
Abstract—This paper proposes methods for information processing of audio streams using methods of information geometry. We lay the theoretical groundwork for a framework allowing...
Arshia Cont, Shlomo Dubnov, Gérard Assayag
COMPSAC
2002
IEEE
14 years 1 months ago
Investigating Large Software System Evolution: The Linux Kernel
Large multi-platform, multi-million lines of codes software systems evolve to cope with new platform or to meet user ever changing needs. While there has been several studies focu...
Ettore Merlo, Michel Dagenais, P. Bachand, J. S. S...