From Fiber Layout to the Sensor: Preparation Methods as Key Factors for High-Quality Coupled-Core-Fiber Sensors. [PDF]
Lindner F+7 more
europepmc +1 more source
Research on the Digital Twin System of Welding Robots Driven by Data. [PDF]
Wang S+6 more
europepmc +1 more source
Energy harvesting from fuel cell bicycles for home DC grids using soft switched DC-DC converter. [PDF]
Ramesh S, Elangovan D.
europepmc +1 more source
Overview of Research Progress and Application Prospects of Thermal Test Chips. [PDF]
Ju L+9 more
europepmc +1 more source
NoButter: An R package for reducing transcript dispersion in CosMx Spatial Molecular Imaging Data
O’Hora B+12 more
europepmc +1 more source
Stack layout transformation: towards diversity for securing binary programs
Despite protracted efforts by both researchers and practitioners, security vulnerabilities remain in modern software. Artificial diversity is an effective defense against many types of attack, and one form, address-space randomization, has been widely applied. Present artificial diversity implementations are either coarse-grained or require source code.
Benjamin D. Rodes
semanticscholar +5 more sources
Multi-stack optimization for data-path chip (microprocessor) layout
As data-path chips such as microprocessors and RISC chips become more complex, multiple stacks of data-path macros are required to implement the entire data-path. The physical decomposition of a chip into a single data-path stack, and control logic of random logic as in the past is not always feasible.
W.K. Luk, Alvar Dean
semanticscholar +4 more sources
Related searches:
SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout
IEEE Transactions on Dependable and Secure Computing, 2022Stack-based memory corruption vulnerabilities have been exploited, allowing attackers to execute arbitrary code and read/write arbitrary memory. Although several solutions have been proposed to prevent memory errors on the stack, they are either limited to a specific type of attack (either spatial or temporal attacks) or cause significant performance ...
Seongman Lee+3 more
openaire +3 more sources
Detecting Stack Layout Corruptions with Robust Stack Unwinding
International Symposium on Recent Advances in Intrusion Detection, 2016The stack is a critical memory structure to ensure the correct execution of programs because control flow changes through the data stored in it, such as return addresses and function pointers. Thus the stack has been a popular target by many attacks and exploits like stack smashing attacks and return-oriented programming (ROP).
Junghwan Rhee+5 more
openaire +3 more sources