نتایج جستجو برای: run time leakage

تعداد نتایج: 1977427  

Journal: :Inf. Comput. 2008
Chiara Braghin Agostino Cortesi Riccardo Focardi

A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to properly protect their content are explicitly identified as boundaries: a boundary can be seen as a resource access manager for confidential data. In this setting, absence of direct information leakage is granted as soon as ...

2009
Hao Xu Ranga Vemuri Wen-Ben Jone

Ever since the invention of various leakage power reduction techniques, leakage and dynamic power reduction techniques are categorized into two separate sets. Most of them cannot be applied together during runtime. The gap between them is due to the large energy breakeven time (EBT) and wakeup time (WUT) of conventional leakage reduction techniques. This paper proposes a new leakage reduction t...

2012
Qizhi Tian Sorin A. Huss

In this paper we propose a novel approach to reveal the information leakage of cryptosystems by means of a side-channel analysis of their power consumption. We therefore introduce first a novel power trace model based on communication theory to better understand and to efficiently exploit power traces in side-channel attacks. Then, we discuss a dedicated attack method denoted as Power Amount An...

Journal: :the modares journal of electrical engineering 2010
seyed morteza - babamir sayed - jalili

static verification and software testing are not able to verify software single-handedly. therefore, another approach called run-time verification dealing with verifying software behavior against constraints at run-time received attention. however, the run-time verification faces the problem of verification of run-time activities against the constraints are specified in high-level and abstractl...

2003
Markus K. Brunnermeier

This paper analyzes the effects of information leakage on trading behavior and market efficiency. It shows that a trader who receives a leaked signal prior to a public announcement can exploit this private information twice. First, when he receives his signal, and second, at the time of the public announcement. The latter effect occurs because he can best infer the extent to which his informati...

2016
Tevfik Bultan

A crucial problem in software security is the detection of side-channels [5, 2, 7]. Information gained by observing non-functional properties of program executions (such as execution time or memory usage) can enable attackers to infer secret information (such as a password). In this talk, I will discuss how symbolic execution, combined with a model counting constraint solver, can be used for qu...

2014
Uday Panwar Kavita Khare Abdoul Rjoub Almotasem Bellah Alajlouni Hassan Almanasrah J. Halter Behnaz Mortazavi D. Duarte Y. Tsai N. Vijaykrishnan Rahul M. Rao Frank Liu Jeffrey L. Burns Richard Brown Nikhil Jayakumar Sunil P Khatri

In Deep Sub-Micron (DSM) technology, leakage power dissipation consumes the substantial percentage of the total power dissipation and rises exponentially according to the International Technology Roadmap for Semiconductor (ITRS). Leakage power decreases battery life for the entire portable battery operated device such as mobile phones, laptop and cam coder etc. VLSI design constraints are alway...

2009
Marc Joye

Classical cryptography considers attack scenarios of adversaries getting black-box access to a cryptosystem, namely to its inputs and outputs. For example, in a chosenciphertext attack, an adversary can submit ciphertexts of her choice to a decryption oracle and receives in return the corresponding plaintexts. In real life, however, an adversary may be more powerful. For example, an adversary m...

Journal: :IEICE Transactions 2011
Lei Zhao Hui Xu Daisuke Ikebuchi Tetsuya Sunata Mitaro Namiki Hideharu Amano

This paper presents a leakage efficient data TLB (Translation Look-aside Buffer) design for embedded processors. Due to the data locality in programs, data TLB references tend to hit only a small number of pages during short execution intervals. After dividing the overall execution time into smaller time slices, a leakage reduction mechanism is proposed to detect TLB entries which actually serv...

2003
Dharmesh Parikh Yan Zhang Karthik Sankaranarayanan Kevin Skadron Mircea Stan

This paper compares the effectiveness of state-preserving and non-state-preserving techniques for leakage control in caches by comparing drowsy cache and gated-V for data caches using 70nm technology parameters. To perform the comparison, we use “HotLeakage”, a new architectural model for subthreshold and gate leakage that explicitly models the effects of temperature, voltage, and parameter var...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید