Sciweavers

1210 search results - page 108 / 242
» Secure Logic Synthesis
Sort
View
ICASSP
2010
IEEE
13 years 10 months ago
Revisiting the security of speaker verification systems against imposture using synthetic speech
In this paper, we investigate imposture using synthetic speech. Although this problem was first examined over a decade ago, dramatic improvements in both speaker verification (S...
Phillip L. De Leon, Vijendra Raj Apsingekar, Micha...
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
14 years 3 months ago
Improving the Security of Dual-Rail Circuits
Dual-rail encoding, return-to-spacer protocol and hazard-free logic can be used to resist differential power analysis attacks by making the power consumption independent of process...
Danil Sokolov, Julian Murphy, Alexandre V. Bystrov...
TLDI
2003
ACM
14 years 3 months ago
The logical approach to stack typing
We develop a logic for reasoning about adjacency and separation of memory blocks, as well as aliasing of pointers. We provide a memory model for our logic and present a sound set ...
Amal J. Ahmed, David Walker
ICST
2008
IEEE
14 years 4 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
ERSA
2009
109views Hardware» more  ERSA 2009»
13 years 8 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic