Results 61 to 70 of about 230,889 (263)

CIDPro: Custom Instructions for Dynamic Program Diversification

open access: yes, 2018
Timing side-channel attacks pose a major threat to embedded systems due to their ease of accessibility. We propose CIDPro, a framework that relies on dynamic program diversification to mitigate timing side-channel leakage.
Biswas, Arnab Kumar   +4 more
core   +1 more source

Olink Proteomics Analysis Reveals Heterogeneous Responses to FcRn Blockade in Anti‐AChR Antibody‐Positive Myasthenia Gravis: FGF‐19 as a Novel Biomarker

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective This study aimed to systematically observe the clinical manifestations, immune cell subsets, and dynamic changes in serological indicators in patients with myasthenia gravis (MG) before and after efgartigimod (EFG) treatment. Methods We analyzed the baseline data, laboratory parameters, and lymphocyte subset proportions in MG ...
Tiancheng Luo   +9 more
wiley   +1 more source

Non-Profiled Deep Learning-Based Side-Channel Preprocessing With Autoencoders

open access: yesIEEE Access, 2021
In recent years, deep learning-based side-channel attacks have established their position as mainstream. However, most deep learning techniques for cryptanalysis mainly focused on classifying side-channel information in a profiled scenario where ...
Donggeun Kwon, Heeseok Kim, Seokhie Hong
doaj   +1 more source

Functional Connectivity Linked to Cognitive Recovery After Minor Stroke

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Patients with minor stroke exhibit slowed processing speed and generalized alterations in functional connectivity involving frontoparietal cortex (FPC). The pattern of connectivity evolves over time. In this study, we examine the relationship of functional connectivity patterns to cognitive performance, to determine ...
Vrishab Commuri   +7 more
wiley   +1 more source

Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes

open access: yes, 2019
In this paper we study reaction and timing attacks against cryptosystems based on sparse parity-check codes, which encompass low-density parity-check (LDPC) codes and moderate-density parity-check (MDPC) codes.
A Becker   +16 more
core   +1 more source

Lessons Learned From a Delayed‐Start Trial of Modafinil for Freezing of Gait in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Freezing of gait (FOG) in people with Parkinson's disease (PwPD) is debilitating and has limited treatments. Modafinil modulates beta/gamma band activity in the pedunculopontine nucleus (PPN), like PPN deep brain stimulation. We therefore tested the hypothesis that Modafinil would improve FOG in PwPD.
Tuhin Virmani   +8 more
wiley   +1 more source

Combined Side Channel Attacks: breaking COMP128

open access: yesБезопасность информационных технологий, 2014
Different variants of combined side channel attacks (SCA) on authentication protocol COMP128 are analyzed in the article, paper. Main attack presented in the paper is partitioning attack.
Alla Borisovna Levina   +1 more
doaj  

ALS With and Without Upper Motor Neuron Signs: A Comparative Study Supporting the Gold Coast Criteria

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective The Gold Coast criteria permit diagnosis of amyotrophic lateral sclerosis (ALS) even without upper motor neuron (UMN) signs. However, whether ALS patients with UMN signs (ALSwUMN) and those without (ALSwoUMN) share similar characteristics and prognoses remains unclear.
Hee‐Jae Jung   +7 more
wiley   +1 more source

The Benefits and Costs of Netlist Randomization Based Side-Channel Countermeasures: An In-Depth Evaluation

open access: yesJournal of Low Power Electronics and Applications, 2022
Exchanging FPGA-based implementations of cryptographic algorithms during run-time using netlist randomized versions has been introduced recently as a unique countermeasure against side channel attacks.
Ali Asghar   +2 more
doaj   +1 more source

Prefetch Side-Channel Attacks

open access: yesProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Modern operating systems use hardware support to protect against control flow hijacking attacks such as code-injection attacks. Typically, write access to executable pages is prevented and kernel mode execution is restricted to kernel code pages only. However, current CPUs provide no protection against code-reuse attacks like ROP.
Gruss, Daniel   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy