Sciweavers

408 search results - page 27 / 82
» Statistical Fault Injection
Sort
View
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
14 years 8 months ago
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. How...
Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Ver...
FAST
2010
13 years 10 months ago
End-to-end Data Integrity for File Systems: A ZFS Case Study
We present a study of the effects of disk and memory corruption on file system data integrity. Our analysis focuses on Sun's ZFS, a modern commercial offering with numerous r...
Yupu Zhang, Abhishek Rajimwale, Andrea C. Arpaci-D...
MASCOTS
2003
13 years 9 months ago
SPEK: A Storage Performance Evaluation Kernel Module for Block Level Storage Systems
— This paper introduces a new benchmark tool, SPEK (Storage Performance Evaluation Kernel module), for evaluating the performance of block-level storage systems in the presence o...
Ming Zhang, Qing Yang, Xubin He
DSN
2002
IEEE
14 years 17 days ago
A Portable and Fault-Tolerant Microprocessor Based on the SPARC V8 Architecture
The architecture and implementation of the LEON-FT processor is presented. LEON-FT is a fault-tolerant 32-bit processor based on the SPARC V8 instruction set. The processors toler...
Jiri Gaisler
FMCAD
2008
Springer
13 years 9 months ago
A Theory of Mutations with Applications to Vacuity, Coverage, and Fault Tolerance
The quality of formal specifications and the circuits they are written for can be evaluated through checks such as vacuity and coverage. Both checks involve mutations to the specif...
Orna Kupferman, Wenchao Li, Sanjit A. Seshia