Results 81 to 90 of about 10,775 (222)

Keep the PokerFace on! Thwarting cache side channel attacks by memory bus monitoring and cache obfuscation

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2017
Cloud instances are vulnerable to cross-core, cross-VM attacks against the shared, inclusive last-level cache. Automated cache template attacks, in particular, are very powerful as the vulnerabilities do not need to be manually identified.
Arun Raj, Janakiram Dharanipragada
doaj   +1 more source

Agnosticism about artificial consciousness

open access: yesMind &Language, EarlyView.
Could an AI have conscious experiences? Answers to this question should be based not on intuition, dogma or speculation but on solid scientific evidence. However, I argue such evidence is hard to come by and that the only justifiable stance is agnosticism.
Tom McClelland
wiley   +1 more source

TrojanWhisper: Evaluating Pre-Trained LLMs to Detect and Localize Hardware Trojans

open access: yesIEEE Access
Existing Hardware Trojan (HT) detection methods face critical limitations: logic testing struggles with scalability, side-channel analysis requires golden reference chips, and formal verification suffers from state-space explosion.
Md Omar Faruque   +3 more
doaj   +1 more source

THE FATHERS, COMPUTERS AND US

open access: yesModern Theology, EarlyView.
Abstract This essay, designed as a complement to opinions expressed by Rowan Williams and some speakers at the conference in his honour, explores features of early Christianity which suggest a positive evaluation of artificial intelligence. Noting that the fear of reducing humans to machines has been joined in the modern age by the fear that machines ...
Mark J. Edwards
wiley   +1 more source

Trusted execution environments for quantum computers

open access: yesFrontiers in Computer Science
The cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property, whether code, or data, or both.
Theodoros Trochatos   +6 more
doaj   +1 more source

Welfare and Felt Duration

open access: yesNoûs, EarlyView.
ABSTRACT How should we understand the duration of a pleasant or unpleasant sensation, insofar as its duration modulates how good or bad the experience is overall? Given that we seem able to distinguish between subjective and objective duration and that how well or badly someone's life goes is naturally thought of as something to be assessed from her ...
Andreas L. Mogensen
wiley   +1 more source

Governing the Local Digital Transformation: A European Comparative Perspective

open access: yesPublic Administration, EarlyView.
ABSTRACT This study compares governance structures, policy formulation and implementation of administrative digitalization at the local level in three countries with different administrative traditions: France, Germany and the United Kingdom.
Sabine Kuhlmann   +2 more
wiley   +1 more source

Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques

open access: yesJournal of Computer Science and Technology, 2008
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj  

Replacement-Based Key-Controlled Circuits: A New Lightweight Logic-Locking Technique to Prevent the SAT Attack and Its Variants

open access: yesApplied Sciences
The current trend of globalization of the supply chain in the integrated circuit (IC) industry has led to numerous security issues, such as intellectual property (IP) piracy, overbuilding, hardware Trojan (HT), and so on.
Weizheng Wang, Luoyi Zhao, Shuo Cai
doaj   +1 more source

The Many Shades of Clouds: How Law Fails (Us) in Seeing Power in the Digital Economy

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Cloud infrastructures form the backbone of our contemporary (digital) production environment. Despite their centrality, legal and scholarly practice have not been treating cloud infrastructures as single objects of/for study. In other words, we have laws for regulating services and products that flow from (within) cloud infrastructures, but we
Petros Terzis   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy