Results 261 to 270 of about 797,630 (345)

From Fiber Layout to the Sensor: Preparation Methods as Key Factors for High-Quality Coupled-Core-Fiber Sensors. [PDF]

open access: yesSensors (Basel)
Lindner F   +7 more
europepmc   +1 more source

Research on the Digital Twin System of Welding Robots Driven by Data. [PDF]

open access: yesSensors (Basel)
Wang S   +6 more
europepmc   +1 more source

Overview of Research Progress and Application Prospects of Thermal Test Chips. [PDF]

open access: yesMicromachines (Basel)
Ju L   +9 more
europepmc   +1 more source

NoButter: An R package for reducing transcript dispersion in CosMx Spatial Molecular Imaging Data

open access: yes
O’Hora B   +12 more
europepmc   +1 more source

Stack layout transformation: towards diversity for securing binary programs

open access: closed2012 34th International Conference on Software Engineering (ICSE), 2012
Despite protracted efforts by both researchers and practitioners, security vulnerabilities remain in modern software. Artificial diversity is an effective defense against many types of attack, and one form, address-space randomization, has been widely applied. Present artificial diversity implementations are either coarse-grained or require source code.
Benjamin D. Rodes
semanticscholar   +5 more sources

Multi-stack optimization for data-path chip (microprocessor) layout

open access: closedProceedings of the 1989 26th ACM/IEEE conference on Design automation conference - DAC '89, 1989
As data-path chips such as microprocessors and RISC chips become more complex, multiple stacks of data-path macros are required to implement the entire data-path. The physical decomposition of a chip into a single data-path stack, and control logic of random logic as in the past is not always feasible.
W.K. Luk, Alvar Dean
semanticscholar   +4 more sources

SaVioR: Thwarting Stack-Based Memory Safety Violations by Randomizing Stack Layout

IEEE Transactions on Dependable and Secure Computing, 2022
Stack-based memory corruption vulnerabilities have been exploited, allowing attackers to execute arbitrary code and read/write arbitrary memory. Although several solutions have been proposed to prevent memory errors on the stack, they are either limited to a specific type of attack (either spatial or temporal attacks) or cause significant performance ...
Seongman Lee   +3 more
openaire   +3 more sources

Detecting Stack Layout Corruptions with Robust Stack Unwinding

International Symposium on Recent Advances in Intrusion Detection, 2016
The stack is a critical memory structure to ensure the correct execution of programs because control flow changes through the data stored in it, such as return addresses and function pointers. Thus the stack has been a popular target by many attacks and exploits like stack smashing attacks and return-oriented programming (ROP).
Junghwan Rhee   +5 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy