Results 81 to 90 of about 10,775 (222)
Cloud instances are vulnerable to cross-core, cross-VM attacks against the shared, inclusive last-level cache. Automated cache template attacks, in particular, are very powerful as the vulnerabilities do not need to be manually identified.
Arun Raj, Janakiram Dharanipragada
doaj +1 more source
Agnosticism about artificial consciousness
Could an AI have conscious experiences? Answers to this question should be based not on intuition, dogma or speculation but on solid scientific evidence. However, I argue such evidence is hard to come by and that the only justifiable stance is agnosticism.
Tom McClelland
wiley +1 more source
TrojanWhisper: Evaluating Pre-Trained LLMs to Detect and Localize Hardware Trojans
Existing Hardware Trojan (HT) detection methods face critical limitations: logic testing struggles with scalability, side-channel analysis requires golden reference chips, and formal verification suffers from state-space explosion.
Md Omar Faruque +3 more
doaj +1 more source
Abstract This essay, designed as a complement to opinions expressed by Rowan Williams and some speakers at the conference in his honour, explores features of early Christianity which suggest a positive evaluation of artificial intelligence. Noting that the fear of reducing humans to machines has been joined in the modern age by the fear that machines ...
Mark J. Edwards
wiley +1 more source
Trusted execution environments for quantum computers
The cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property, whether code, or data, or both.
Theodoros Trochatos +6 more
doaj +1 more source
ABSTRACT How should we understand the duration of a pleasant or unpleasant sensation, insofar as its duration modulates how good or bad the experience is overall? Given that we seem able to distinguish between subjective and objective duration and that how well or badly someone's life goes is naturally thought of as something to be assessed from her ...
Andreas L. Mogensen
wiley +1 more source
Governing the Local Digital Transformation: A European Comparative Perspective
ABSTRACT This study compares governance structures, policy formulation and implementation of administrative digitalization at the local level in three countries with different administrative traditions: France, Germany and the United Kingdom.
Sabine Kuhlmann +2 more
wiley +1 more source
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj
The current trend of globalization of the supply chain in the integrated circuit (IC) industry has led to numerous security issues, such as intellectual property (IP) piracy, overbuilding, hardware Trojan (HT), and so on.
Weizheng Wang, Luoyi Zhao, Shuo Cai
doaj +1 more source
The Many Shades of Clouds: How Law Fails (Us) in Seeing Power in the Digital Economy
ABSTRACT Cloud infrastructures form the backbone of our contemporary (digital) production environment. Despite their centrality, legal and scholarly practice have not been treating cloud infrastructures as single objects of/for study. In other words, we have laws for regulating services and products that flow from (within) cloud infrastructures, but we
Petros Terzis +2 more
wiley +1 more source

