Sciweavers

11603 search results - page 130 / 2321
» Securing Embedded Systems
Sort
View
CODES
2007
IEEE
14 years 4 months ago
A smart random code injection to mask power analysis based side channel attacks
One of the security issues in embedded system is the ability of an adversary to perform side channel attacks. Power analysis attacks are often very successful, where the power seq...
Jude Angelo Ambrose, Roshan G. Ragel, Sri Paramesw...
SAC
2004
ACM
14 years 3 months ago
Code generation techniques for developing light-weight XML Web services for embedded devices
This paper presents specialized code generation techniques and runtime optimizations for developing light-weight XML Web services for embedded devices. The optimizations are imple...
Robert van Engelen
ACSAC
2004
IEEE
14 years 1 months ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
RTAS
2009
IEEE
14 years 4 months ago
QeDB: A Quality-Aware Embedded Real-Time Database
QeDB is a database for data-intensive real-time applications running on flash memory-based embedded systems. Currently, databases for embedded systems are best effort, providing ...
Woochul Kang, Sang Hyuk Son, John A. Stankovic
ESORICS
2002
Springer
14 years 9 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...