نتایج جستجو برای: software countermeasure
تعداد نتایج: 441146 فیلتر نتایج به سال:
The Electronic Warfare Division, of the Avionics Laboratory at the Wright Research and Development Center (WRDC), WPAFB, has two in-house facilities which are used in the evaluation of conceptual infrared (IR) and electro-optical (EO) countermeasure techniques. The ftrst facility, called the Dynamic Infrared Missile Evaluator (DIME), is a 6-degree of freedom hardware-in-the-loop infrared (IR) m...
Security-enabled RFID tags become more and more important and integrated in our daily life. While the tags implement cryptographic algorithms that are secure in a mathematical sense, their implementation is susceptible to attacks. Physical side channels leak information about the processed secrets. This article focuses on practical analysis of electromagnetic (EM) side channels and evaluates di...
Fault attack countermeasures can be implemented by storing or computing sensitive data in redundant form, such that the faulty data can be detected and restored. We present a class of lightweight, portable software countermeasures for block ciphers. Our technique is based on redundant bit-slicing, and it is able to detect faults in the execution of a single instruction. In comparison to earlier...
driver fatigue may impose the risk of crashes and is a leading cause of death in transportation industry. this study aimed to detect driver cognitive fatigue based on changes in eeg frequency bands in non-professional drivers during a simulated driving task. in a descriptive-analytical study, 12 healthy male car drivers took part in a two hour driving session on a simulated monotonous road, whi...
Risk analysis in complex systems must cope with sophisticated threats arising from attackers exploiting security loopholes, or a chain of accidental events triggered by some environmental incident. A security model for complex IT systems, termed the ISM (Information Security Model) stores system and risk information in a database. Associated software uses the database information to develop thr...
Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead needed to provide reconfigurability. We show that dynamic reconfiguration can also improve the resistance of cryptographic systems against physical attacks. First, we demonstrate how dynamic reconfiguration can reali...
UNLABELLED We previously found that simultaneously executing a mental countermeasure and an explicit required response impairs reaction time (RT)-based detection of countermeasure use in a P300- based concealed information test. To address this issue, we increased the numbers of irrelevant stimuli to eight, and manipulated the proportions of to-be-countered irrelevant stimuli from 25% to 50% to...
When software projects evolve their actual implementation and their intended architecture may drift apart resulting in problems for further maintenance. As a countermeasure it is good software engineering practice to check the implementation against the architectural description for consistency. In this work we check software developed by a Model Driven Software Development (MDSD) process. This...
User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also prese...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید