نتایج جستجو برای: software countermeasure

تعداد نتایج: 441146  

2002
Sung-Ming Yen Sang-Jae Moon JaeCheol Ha

In this paper, some powerful fault attacks will be pointed out which can be used to factorize the RSA modulus if CRT is employed to speedup the RSA computation. These attacks are generic and can be applicable to Shamir’s countermeasure and also applicable to a recently published enhanced countermeasure (trying to improve Shamir’s method) for RSA with CRT. These two countermeasures share some si...

2007
Janis Davis-Street William H. Paloski

Prolonged microgravity exposure disrupts bone, muscle, and cardiovascular homeostasis, sensory-motor coordination, immune function, and behavioral performance. Bone loss, in particular, remains a serious impediment to the success of exploration-class missions by increasing the risks of bone fracture and renal stone formation for crew members. Current countermeasures, consisting primarily of res...

Journal: :it - Information Technology 2010
Sven Wohlgemuth Isao Echizen Günter Müller Noboru Sonehara

Privacy in cloud computing is at the moment simply a promise to be kept by the software service providers. Users are neither able to control the disclosure of personal data to third parties nor to check if the software service providers have followed the agreed-upon privacy policy. Therefore, disclosure of the users’ data to the software service providers of the cloud raises privacy risks. This...

Journal: :Lecture Notes in Computer Science 2021

The wire probe-and-fault models are currently the most used to provide arguments for side-channel and fault security. However, several practical attacks not yet covered by these models. This work extends model include more advanced faults such as area permanent faults. Moreover, we show tile adversary from CRYPTO 2018’s CAPA envelops extended along with known extensions probing glitches, transi...

2017
Ramaswamy Chandramouli

80 Application Containers are slowly finding adoption in enterprise IT infrastructures. Security 81 guidelines and countermeasures have been proposed to address security concerns associated with 82 the deployment of application container platforms. To assess the effectiveness of the security 83 solutions implemented based on these recommendations, it is necessary to analyze them and 84 outline ...

2017
Ramaswamy Chandramouli

80 Application Containers are slowly finding adoption in enterprise IT infrastructures. Security 81 guidelines and countermeasures have been proposed to address security concerns associated with 82 the deployment of application container platforms. To assess the effectiveness of the security 83 solutions implemented based on these recommendations, it is necessary to analyze them and 84 outline ...

2007
Chengming Zhang Jixian Zhang Yong Liang Yan Zhang Guitang Yin

The automatic monitoring system of reservoir is an important means to realize modernization of reservoir management. This paper expounds the structure of automatic monitoring system of reservoir firstly. The system consists of three subsystems, which are acquisition subsystem transmission subsystem and data management subsystem. Secondly the design of the data collection terminal is studied, wh...

Journal: :CoRR 2016
Igino Corona Battista Biggio Davide Maiorca

We present AdversariaLib, an open-source python library for the security evaluation of machine learning (ML) against carefully-targeted attacks. It supports the implementation of several attacks proposed thus far in the literature of adversarial learning, allows for the evaluation of a wide range of ML algorithms, runs on multiple platforms, and has multiprocessing enabled. The library has a mo...

2009
J. P. Tremblay C. R. Viau

The paper describes a methodology for characterizing the signatures of targets for Imaging Infrared (IIR) missiles and generating dynamic missile engagement scenarios using MathWorks tools (primarily MATLAB and Simulink). The over-all objective of this work was to develop high fidelity physics-based simulations of the attack of IIR missiles on targets that are using various types of countermeas...

Journal: :IJCNIS 2009
Jaydip Sen

Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید