Sciweavers

2429 search results - page 133 / 486
» Using Aspects to Design a Secure System
Sort
View
GEOINFO
2004
13 years 10 months ago
Design and Implementation Issues for Explorative Location-based Applications: The NexusRallye
: Explorative Location-based Applications (eLBA), define a new class of applications that rely on both positioning (i.e. location information) and georeferenced information in addi...
Daniela Nicklas, Nicola Hönle, Michael Molten...
HOST
2008
IEEE
14 years 3 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
CCS
2008
ACM
13 years 11 months ago
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
TII
2010
146views Education» more  TII 2010»
13 years 3 months ago
A Flexible Design Flow for Software IP Binding in FPGA
Software intellectual property (SWIP) is a critical component of increasingly complex field programmable gate arrays (FPGA)-based system-on-chip (SOC) designs. As a result, develop...
Michael A. Gora, Abhranil Maiti, Patrick Schaumont
ACSAC
2010
IEEE
13 years 7 months ago
A framework for testing hardware-software security architectures
New security architectures are difficult to prototype and test at the design stage. Fine-grained monitoring of the interactions between hardware, the operating system, and applica...
Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-...