Results 61 to 70 of about 263,653 (212)

Glider: A GPU Library Driver for Improved System Security [PDF]

open access: yes, 2014
Legacy device drivers implement both device resource management and isolation. This results in a large code base with a wide high-level interface making the driver vulnerable to security attacks.
Sani, Ardalan Amiri   +2 more
core  

An experimental Study using ACSL and Frama-C to formulate and verify Low-Level Requirements from a DO-178C compliant Avionics Project

open access: yes, 2015
Safety critical avionics software is a natural application area for formal verification. This is reflected in the formal method's inclusion into the certification guideline DO-178C and its formal methods supplement DO-333.
Dordowsky, Frank
core   +2 more sources

Developing a Mini Smart House model [PDF]

open access: yes, 2019
The work is devoted to designing a smart home educational model. The authors analyzed the literature in the field of the Internet of Things and identified the basic requirements for the training model.
Balyk, Nadiia   +2 more
core   +1 more source

Random Number Generation from a Secure Photonic Physical Unclonable Hardware Module [PDF]

open access: yes, 2018
In this work, a photonic physical unclonable function module, based on an optical waveguide, is demonstrated. The physical scrambling mechanism is based on the random and complex coherent interference of high order optical transverse modes. The proposed scheme allows the generation of random bit- strings, through a simple wavelength tuning of the laser
Akriotou, M.   +5 more
openaire   +2 more sources

The acoustic encryption transmission system based on improved DEA

open access: yesDianzi Jishu Yingyong, 2019
The system adopts the improved data encryption algorithm(DEA), and the hardware encryption system is constructed by complex programmable logic device(CPLD) chip EPM570.
Shan Huilin, Zhang Yinsheng
doaj   +1 more source

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels

open access: yes, 2018
Commodity OS kernels have broad attack surfaces due to the large code base and the numerous features such as device drivers. For a real-world use case (e.g., an Apache Server), many kernel services are unused and only a small amount of kernel code is ...
A Kurmus   +6 more
core   +1 more source

Trusted Cameras on Mobile Devices Based on SRAM Physically Unclonable Functions

open access: yesSensors, 2018
Nowadays, there is an increasing number of cameras placed on mobile devices connected to the Internet. Since these cameras acquire and process sensitive and vulnerable data in applications such as surveillance or monitoring, security is essential to ...
Rosario Arjona   +3 more
doaj   +1 more source

RowHammer: Reliability Analysis and Security Implications [PDF]

open access: yes, 2016
As process technology scales down to smaller dimensions, DRAM chips become more vulnerable to disturbance, a phenomenon in which different DRAM cells interfere with each other's operation. For the first time in academic literature, our ISCA paper exposes
Daly, Ross   +8 more
core  

Secure Positioning of Mobile Terminals with Simplex Radio Communication [PDF]

open access: yes, 2006
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings.
Fujii, Mikio
core   +2 more sources

Reconfigurable Mobile Multimedia Systems [PDF]

open access: yes, 1999
This paper discusses reconfigurability issues in lowpower hand-held multimedia systems, with particular emphasis on energy conservation. We claim that a radical new approach has to be taken in order to fulfill the requirements - in terms of processing ...
Bos, Martinus   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy