Results 61 to 70 of about 263,653 (212)
Glider: A GPU Library Driver for Improved System Security [PDF]
Legacy device drivers implement both device resource management and isolation. This results in a large code base with a wide high-level interface making the driver vulnerable to security attacks.
Sani, Ardalan Amiri +2 more
core
Safety critical avionics software is a natural application area for formal verification. This is reflected in the formal method's inclusion into the certification guideline DO-178C and its formal methods supplement DO-333.
Dordowsky, Frank
core +2 more sources
Developing a Mini Smart House model [PDF]
The work is devoted to designing a smart home educational model. The authors analyzed the literature in the field of the Internet of Things and identified the basic requirements for the training model.
Balyk, Nadiia +2 more
core +1 more source
Random Number Generation from a Secure Photonic Physical Unclonable Hardware Module [PDF]
In this work, a photonic physical unclonable function module, based on an optical waveguide, is demonstrated. The physical scrambling mechanism is based on the random and complex coherent interference of high order optical transverse modes. The proposed scheme allows the generation of random bit- strings, through a simple wavelength tuning of the laser
Akriotou, M. +5 more
openaire +2 more sources
The acoustic encryption transmission system based on improved DEA
The system adopts the improved data encryption algorithm(DEA), and the hardware encryption system is constructed by complex programmable logic device(CPLD) chip EPM570.
Shan Huilin, Zhang Yinsheng
doaj +1 more source
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels
Commodity OS kernels have broad attack surfaces due to the large code base and the numerous features such as device drivers. For a real-world use case (e.g., an Apache Server), many kernel services are unused and only a small amount of kernel code is ...
A Kurmus +6 more
core +1 more source
Trusted Cameras on Mobile Devices Based on SRAM Physically Unclonable Functions
Nowadays, there is an increasing number of cameras placed on mobile devices connected to the Internet. Since these cameras acquire and process sensitive and vulnerable data in applications such as surveillance or monitoring, security is essential to ...
Rosario Arjona +3 more
doaj +1 more source
RowHammer: Reliability Analysis and Security Implications [PDF]
As process technology scales down to smaller dimensions, DRAM chips become more vulnerable to disturbance, a phenomenon in which different DRAM cells interfere with each other's operation. For the first time in academic literature, our ISCA paper exposes
Daly, Ross +8 more
core
Secure Positioning of Mobile Terminals with Simplex Radio Communication [PDF]
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings.
Fujii, Mikio
core +2 more sources
Reconfigurable Mobile Multimedia Systems [PDF]
This paper discusses reconfigurability issues in lowpower hand-held multimedia systems, with particular emphasis on energy conservation. We claim that a radical new approach has to be taken in order to fulfill the requirements - in terms of processing ...
Bos, Martinus +3 more
core +3 more sources

