Results 61 to 70 of about 10,775 (222)
Trojans in Early Design Steps—An Emerging Threat [PDF]
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T. +2 more
core
Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization
Intel Software Guard Extensions (SGX) is a promising hardware-based technology for protecting sensitive computations from potentially compromised system software.
Brasser F. +4 more
core +1 more source
THE URBANOLOGISTS COME TO TOWN: Professional Life and Work in the Urban Solutions Industry
Abstract This article charts the upsurge of an eclectic global community of professionals new to the field of urban policy and governance, animated by playful and celebratory attitudes towards cities and urbanization: the urbanologists. It contributes to debates in critical urban theory and critical ethnographies of technology to problematize ...
Rachel Bok
wiley +1 more source
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier +3 more
doaj +1 more source
As a promising alternative to dynamic RAM, phase change memory (PCM) suffers from limited write endurance. Therefore, many research proposals on PCM security or reliability have focussed on the possible threat of wear‐out attacks from malicious ...
Xianzhong Zhou, Ying Wang
doaj +1 more source
Privacy Aware Offloading of Deep Neural Networks [PDF]
Deep neural networks require large amounts of resources which makes them hard to use on resource constrained devices such as Internet-of-things devices.
Dhoedt, Bart +3 more
core +2 more sources
ABSTRACT An inherent divide features within the Lisbon Treaty between civilian and military/security competences; something previously more obvious via the ‘pillar system's’ separations. This division follows the Member States (MS) (natural) protection of their military/defence autonomy; their core sovereign powers.
Charlie J. P. Bennett
wiley +1 more source
Sphinx: A Secure Architecture Based on Binary Code Diversification and Execution Obfuscation [PDF]
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application functionality while obfuscating the ...
Ehret, Alan +3 more
core +1 more source
Abstract This article argues that policy learning is essential for effective innovation policy. The ability to learn from past experiments in a reflexive fashion is a prerequisite for effective policy design. The article responds to the call for more applied research to compliment the theoretical framing of policy learning in the literature.
David A. Wolfe, Travis Southin
wiley +1 more source
Robo‐Saber: Generating and Simulating Virtual Reality Players
Abstract We present the first motion generation system for playtesting virtual reality (VR) games. Our player model generates VR headset and handheld controller movements from in‐game object arrangements, guided by style reference gameplay examples. We train on the large BOXRR‐23 dataset and apply our framework on the popular VR game Beat Saber.
N. H. Kim +5 more
wiley +1 more source

