نتایج جستجو برای: software countermeasure
تعداد نتایج: 441146 فیلتر نتایج به سال:
This paper customizes Goal/Question/Metric (GQM) project monitoring models for various projects and organizations to take advantage of the data from the software tool EPM and to allow the tailoring of the interpretation models based upon the context and success criteria for each project and organization. The basic idea is to build less concrete models that do not include explicit baseline value...
In 2016, a countermeasure against the Nankai trough long-period and long-duration ground motions (LPGMs) was announced. However, response spectrum method (RSM), indicated by Ministry of Construction notification Vol. 2009 (MCN), is out countermeasure. An RSM that considers characteristic changes due to repeated deformation has also been proposed, but since damping correction formula MCN used, i...
In an earlier paper [Danielsson, 1986], we studied the problem of estimating the safety effect of a countermeasure on the expected number of accidents at road junctions when high-accident sites are selected for the study. Often, however, the countermeasure leads to varying effectiveness on different types of accidents. This paper is a generalization in that we estimate effects of countermeasure...
In this paper we study a parity check based countermeasure proposed by Chen et al. that thwarts their attack by detecting byte fault injection during the AES key schedule process. We provide a generalization of their approach that allows to derive parity equations for every AES sizes not given by the authors. We analyze why Chen et al. countermeasure does not properly works. Doing so we are abl...
Virtualization has become of increasing importance for the security of embedded systems during the last years. One of the major threats to this security is posed by side channel attacks. In this work, Bernstein’s time-driven cache-based timing attack against AES is revisited in a virtualization security scenario and the PikeOS micro kernel system is presented. A novel countermeasure against tim...
The satellite TV industry relies heavily on the use of smart card technology at the very heart of broadcasted services that are protected by legacy conditional access systems. The process of Satellite TV signal protection is distributed amongst a number of system components, e.g. smart cards, receivers, Conditional Access Modules (CAM) and the content provider. However, the introduction of “Ope...
Ricin toxin has been regarded as one of the most potent poisons in the plant kingdom, and there is no effective therapeutic countermeasure or licensed vaccine against it. Consequently, early detection of ricin intoxication is necessary. In this study, we took mice as test subjects, and used the technique of Matrix-assisted laser desorption/ionization time of flight mass spectrometry (MALDI-TOF/...
Security risk analysis should be conducted regularly to maintain an acceptable level of security. In principle, all risks that are unacceptable according to the predefined criteria should be mitigated. However, risk mitigation comes at a cost, and only the countermeasures that cost-efficiently mitigate risks should be implemented. This paper presents an approach to integrate the countermeasure ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید