نتایج جستجو برای: software countermeasure
تعداد نتایج: 441146 فیلتر نتایج به سال:
In this paper, some powerful fault attacks will be pointed out which can be used to factorize the RSA modulus if CRT is employed to speedup the RSA computation. These attacks are generic and can be applicable to Shamir’s countermeasure and also applicable to a recently published enhanced countermeasure (trying to improve Shamir’s method) for RSA with CRT. These two countermeasures share some si...
Prolonged microgravity exposure disrupts bone, muscle, and cardiovascular homeostasis, sensory-motor coordination, immune function, and behavioral performance. Bone loss, in particular, remains a serious impediment to the success of exploration-class missions by increasing the risks of bone fracture and renal stone formation for crew members. Current countermeasures, consisting primarily of res...
Privacy in cloud computing is at the moment simply a promise to be kept by the software service providers. Users are neither able to control the disclosure of personal data to third parties nor to check if the software service providers have followed the agreed-upon privacy policy. Therefore, disclosure of the users’ data to the software service providers of the cloud raises privacy risks. This...
The wire probe-and-fault models are currently the most used to provide arguments for side-channel and fault security. However, several practical attacks not yet covered by these models. This work extends model include more advanced faults such as area permanent faults. Moreover, we show tile adversary from CRYPTO 2018’s CAPA envelops extended along with known extensions probing glitches, transi...
80 Application Containers are slowly finding adoption in enterprise IT infrastructures. Security 81 guidelines and countermeasures have been proposed to address security concerns associated with 82 the deployment of application container platforms. To assess the effectiveness of the security 83 solutions implemented based on these recommendations, it is necessary to analyze them and 84 outline ...
80 Application Containers are slowly finding adoption in enterprise IT infrastructures. Security 81 guidelines and countermeasures have been proposed to address security concerns associated with 82 the deployment of application container platforms. To assess the effectiveness of the security 83 solutions implemented based on these recommendations, it is necessary to analyze them and 84 outline ...
The automatic monitoring system of reservoir is an important means to realize modernization of reservoir management. This paper expounds the structure of automatic monitoring system of reservoir firstly. The system consists of three subsystems, which are acquisition subsystem transmission subsystem and data management subsystem. Secondly the design of the data collection terminal is studied, wh...
We present AdversariaLib, an open-source python library for the security evaluation of machine learning (ML) against carefully-targeted attacks. It supports the implementation of several attacks proposed thus far in the literature of adversarial learning, allows for the evaluation of a wide range of ML algorithms, runs on multiple platforms, and has multiprocessing enabled. The library has a mo...
The paper describes a methodology for characterizing the signatures of targets for Imaging Infrared (IIR) missiles and generating dynamic missile engagement scenarios using MathWorks tools (primarily MATLAB and Simulink). The over-all objective of this work was to develop high fidelity physics-based simulations of the attack of IIR missiles on targets that are using various types of countermeas...
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید