Sciweavers

761 search results - page 91 / 153
» Reverse engineering MAC
Sort
View
ICCAD
2008
IEEE
130views Hardware» more  ICCAD 2008»
14 years 5 months ago
Lightweight secure PUFs
— To ensure security and robustness of the next generation of Physically Unclonable Functions (PUFs), we have developed a new methodology for PUF design. Our approach employs int...
Mehrdad Majzoobi, Farinaz Koushanfar, Miodrag Potk...
FDTC
2009
Springer
100views Cryptology» more  FDTC 2009»
14 years 2 months ago
Using Optical Emission Analysis for Estimating Contribution to Power Analysis
—This paper shows that optical emissions from an operating chip have a good correlation with power traces and can therefore be used to estimate the contribution of different area...
Sergei P. Skorobogatov
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
14 years 2 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.
ECBS
2007
IEEE
149views Hardware» more  ECBS 2007»
14 years 2 months ago
Component-Based System Integration via (Meta)Model Composition
This paper provides three contributions to the study of functional integration of distributed enterprise systems. First, we describe the challenges associated with functionally in...
Krishnakumar Balasubramanian, Douglas C. Schmidt, ...
OOPSLA
2007
Springer
14 years 2 months ago
Refactoring support for the C++ development tooling
This article reveals our work on refactoring plug-ins for Eclipse’s C++ Development Tooling (CDT). With CDT a reliable open source IDE exists for C/C++ developers. Unfortunately...
Emanuel Graf, Guido Zgraggen, Peter Sommerlad