Results 81 to 90 of about 514,969 (347)

Prefetch Side-Channel Attacks

open access: yesProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Modern operating systems use hardware support to protect against control flow hijacking attacks such as code-injection attacks. Typically, write access to executable pages is prevented and kernel mode execution is restricted to kernel code pages only. However, current CPUs provide no protection against code-reuse attacks like ROP.
Gruss, Daniel   +4 more
openaire   +1 more source

Exploring Patients’ Profiles Associated With the Resolution of Acute Calcium Pyrophosphate Arthritis Treated With Colchicine and Prednisone: Post Hoc Analysis of a Randomized Controlled Trial

open access: yesArthritis Care &Research, EarlyView.
Objective The objective was to identify factors determining acute arthritis resolution and safety with colchicine and prednisone in acute calcium pyrophosphate (CPP) crystal arthritis. Methods We conducted a post hoc analysis of the COLCHICORT trial, which compared colchicine and prednisone for the treatment of acute CPP crystal arthritis, using a ...
Tristan Pascart   +14 more
wiley   +1 more source

Improved Hybrid Approach for Side-Channel Analysis Using Efficient Convolutional Neural Network and Dimensionality Reduction

open access: yesIEEE Access, 2020
Deep learning-based side channel attacks are burgeoning due to their better efficiency and performance, suppressing the traditional side-channel analysis.
Naila Mukhtar   +4 more
doaj   +1 more source

Clinical Practice Guideline for Evaluation and Management of Peripheral Nervous System Manifestations in Sjögren's Disease

open access: yesArthritis Care &Research, Accepted Article.
Objectives Sjögren's disease is an autoimmune disorder that can impact multiple organ systems, including the peripheral nervous system (PNS). PNS manifestations, which can exist concurrently, include mononeuropathies, polyneuropathies, and autonomic nervous system neuropathies. To help patients and providers in the decision‐making process, we developed
Anahita Deboo   +19 more
wiley   +1 more source

STELLAR: A Generic EM Side-Channel Attack Protection through Ground-Up Root-cause Analysis

open access: yesIEEE International Symposium on Hardware Oriented Security and Trust, 2019
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-connected devices. While numerous power side-channel countermeasures have been proposed, a promising approach to protect the non-invasive electromagnetic ...
Debayan Das   +4 more
semanticscholar   +1 more source

High efficiency power side-channel attack immunity using noise injection in attenuated signature domain [PDF]

open access: yesIEEE International Symposium on Hardware Oriented Security and Trust, 2017
With the advancement of technology in the last few decades, leading to the widespread availability of miniaturized sensors and internet-connected things (IoT), security of electronic devices has become a top priority.
Debayan Das   +5 more
semanticscholar   +1 more source

Organic Electrochemical Transistor Channel Materials: Copolymerization Versus Physical Mixing of Glycolated and Alkoxylated Polymers

open access: yesAdvanced Functional Materials, EarlyView.
This work discusses the use of blended channel materials in OECTs. It explores how mixing glycolated and alkoxylated polymers in various ratios offers a simpler and more efficient route to tuning OECT properties. The performance of the polymer blends is compared to the corresponding copolymers, demonstrating similar OECT characteristics, swelling ...
Lize Bynens   +14 more
wiley   +1 more source

Task Parameters Analysis in Schedule-Based Timing Side-Channel Attack

open access: yesIEEE Access, 2020
Recent work has shown that the timing behavior of a real-time system can be utilized by attackers for various adverse purposes via schedule-based timing side-channel attacks.
Songran Liu, Wang Yi
doaj   +1 more source

On the Machine Learning Techniques for Side-channel Analysis [PDF]

open access: yes, 2016
Side-channel attacks represent one of the most powerful category of attacks on cryptographic devices with profiled attacks in a prominent place as the most powerful among them.
Guilley, Sylvain   +2 more
core  

Understanding and Optimizing Li Substitution in P2‐Type Sodium Layered Oxides for Sodium‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
This work explores Li‐substituted P2 layered oxides for Na‐ion batteries by crystallographic and electrochemical studies. The effect of lithium on superstructure orderings, on phase transitions during synthesis and electrochemical cycling and on the interplay of O‐ versus TM‐redox is revealed via various advanced techniques, including semi‐simultaneous 
Mingfeng Xu   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy