Results 61 to 70 of about 10,775 (222)

Trojans in Early Design Steps—An Emerging Threat [PDF]

open access: yes, 2016
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T.   +2 more
core  

Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization

open access: yes, 2018
Intel Software Guard Extensions (SGX) is a promising hardware-based technology for protecting sensitive computations from potentially compromised system software.
Brasser F.   +4 more
core   +1 more source

THE URBANOLOGISTS COME TO TOWN: Professional Life and Work in the Urban Solutions Industry

open access: yesInternational Journal of Urban and Regional Research, EarlyView.
Abstract This article charts the upsurge of an eclectic global community of professionals new to the field of urban policy and governance, animated by playful and celebratory attitudes towards cities and urbanization: the urbanologists. It contributes to debates in critical urban theory and critical ethnographies of technology to problematize ...
Rachel Bok
wiley   +1 more source

OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier   +3 more
doaj   +1 more source

Enhancing the security of memory in cloud infrastructure through in‐phase change memory data randomisation

open access: yesIET Computers & Digital Techniques, 2021
As a promising alternative to dynamic RAM, phase change memory (PCM) suffers from limited write endurance. Therefore, many research proposals on PCM security or reliability have focussed on the possible threat of wear‐out attacks from malicious ...
Xianzhong Zhou, Ying Wang
doaj   +1 more source

Privacy Aware Offloading of Deep Neural Networks [PDF]

open access: yes, 2018
Deep neural networks require large amounts of resources which makes them hard to use on resource constrained devices such as Internet-of-things devices.
Dhoedt, Bart   +3 more
core   +2 more sources

The Dual‐Use Conundrum of the Lisbon Treaty Regarding Space Governance: Solutions Through International Legal Interpretation?

open access: yesGlobal Policy, EarlyView.
ABSTRACT An inherent divide features within the Lisbon Treaty between civilian and military/security competences; something previously more obvious via the ‘pillar system's’ separations. This division follows the Member States (MS) (natural) protection of their military/defence autonomy; their core sovereign powers.
Charlie J. P. Bennett
wiley   +1 more source

Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation [PDF]

open access: yes, 2018
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application functionality while obfuscating the ...
Ehret, Alan   +3 more
core   +1 more source

Policy Learning and Policy Development in Innovation Policy: Canada's Global Innovation Clusters Initiative

open access: yesCanadian Public Administration, EarlyView.
Abstract This article argues that policy learning is essential for effective innovation policy. The ability to learn from past experiments in a reflexive fashion is a prerequisite for effective policy design. The article responds to the call for more applied research to compliment the theoretical framing of policy learning in the literature.
David A. Wolfe, Travis Southin
wiley   +1 more source

Robo‐Saber: Generating and Simulating Virtual Reality Players

open access: yesComputer Graphics Forum, EarlyView.
Abstract We present the first motion generation system for playtesting virtual reality (VR) games. Our player model generates VR headset and handheld controller movements from in‐game object arrangements, guided by style reference gameplay examples. We train on the large BOXRR‐23 dataset and apply our framework on the popular VR game Beat Saber.
N. H. Kim   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy