Results 51 to 60 of about 776,400 (220)
As a promising alternative to dynamic RAM, phase change memory (PCM) suffers from limited write endurance. Therefore, many research proposals on PCM security or reliability have focussed on the possible threat of wear‐out attacks from malicious ...
Xianzhong Zhou, Ying Wang
doaj +1 more source
Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca +1 more
core
Waiting for a Release: The Expectation in Virtual Gaming Communities
ABSTRACT This study examines how virtual gaming communities influence and maintain player expectations before, during, and after a game's release. A mixed‐methods study was conducted, comprising a netnography followed by an experiment. First, a netnographic study was conducted over 12 months, tracking communities to understand player behavior and ...
Lucas Lopes Ferreira de Souza +4 more
wiley +1 more source
Reusing Logic Masking to Facilitate Hardware Trojan Detection [PDF]
Hardware Trojan (HT) and Integrated Circuit (IC)/ Intellectual Property (IP) piracy are important threats which may happen in untrusted fabrication foundries.
Beroulle, Vincent +2 more
core
ABSTRACT Immersive virtual reality (IVR) is widely promoted as a means of enriching learning in science, technology, engineering, arts and mathematics (STEAM), yet evidence of its capacity to foster equitable classroom experiences for marginalised groups remains limited, particularly outside traditional STEM domains.
Carly Waterhouse‐Boot +1 more
wiley +1 more source
Dynamic Analysis of Executables to Detect and Characterize Malware
It is needed to ensure the integrity of systems that process sensitive information and control many aspects of everyday life. We examine the use of machine learning algorithms to detect malware using the system calls generated by executables-alleviating ...
Aimone, James B. +6 more
core +1 more source
Towards cognitive obfuscation [PDF]
In contrast to software reverse engineering, there are hardly any tools available that support hardware reversing. Therefore, the reversing process is conducted by human analysts combining several complex semi-automated steps. However, countermeasures against reversing are evaluated solely against mathematical models.
Wiesen, Carina +7 more
openaire +2 more sources
Practical Implementation of Robust State-Space Obfuscation for Hardware IP Protection
Hardware obfuscation is a design transformation technique that transforms a design to protect its confidentiality against untrusted parties. In particular, it aims at protecting proprietary hardware intellectual property (IP) blocks against reverse ...
Md. Moshiur Rahman, S. Bhunia
semanticscholar +1 more source
RTL Interconnect Obfuscation By Polymorphic Switch Boxes For Secure Hardware Generation [PDF]
Logic Obfuscation is a well renowned design-for-trust solution to protect an Integrated Circuit (IC) from unauthorized use and illegal overproduction by including key-gates to lock the design.
Haimanti Chakraborty, Ranga Vemuri
semanticscholar +1 more source
Photo‐Excitations in Halide Perovskites: Where Do Simulations and Experiments Meet?
Aiming to bridge the gap between simulations and measurements of light–matter couplings and photo‐excitations in new functional materials, this perspective highlights insights and bottlenecks of state‐of‐the‐art experimental and theoretical methods (2D electronic spectroscopy vs.
Muhammad Sufyan Ramzan +5 more
wiley +1 more source

