نتایج جستجو برای: software countermeasure

تعداد نتایج: 441146  

2010
George A. Vogel Edward G. Huber

The Electronic Warfare Division, of the Avionics Laboratory at the Wright Research and Development Center (WRDC), WPAFB, has two in-house facilities which are used in the evaluation of conceptual infrared (IR) and electro-optical (EO) countermeasure techniques. The ftrst facility, called the Dynamic Infrared Missile Evaluator (DIME), is a 6-degree of freedom hardware-in-the-loop infrared (IR) m...

2009
Thomas Plos Michael Hutter Martin Feldhofer

Security-enabled RFID tags become more and more important and integrated in our daily life. While the tags implement cryptographic algorithms that are secure in a mathematical sense, their implementation is susceptible to attacks. Physical side channels leak information about the processed secrets. This article focuses on practical analysis of electromagnetic (EM) side channels and evaluates di...

2016
Conor Patrick Bilgiday Yuce Nahid Farhady Ghalaty Patrick Schaumont

Fault attack countermeasures can be implemented by storing or computing sensitive data in redundant form, such that the faulty data can be detected and restored. We present a class of lightweight, portable software countermeasures for block ciphers. Our technique is based on redundant bit-slicing, and it is able to detect faults in the execution of a single instruction. In comparison to earlier...

Journal: :مجله علوم اعصاب شفای خاتم 0
faramarz gharagozlou department of occupational health, school of public health, kermanshah university of medical sciences, kermanshah, iran. adel mazloumi department of occupational health, school of public health, tehran university of medical sciences, tehran, iran. jabraeil nasl saraji department of occupational health, school of public health, tehran university of medical sciences, tehran, iran. ali nahvi department of mechanical engineering, k. n. toosi university of technology, tehran, iran. ali motie nasrabadi department of biomedical engineering, shahed university, tehran, iran.

driver fatigue may impose the risk of crashes and is a leading cause of death in transportation industry. this study aimed to detect driver cognitive fatigue based on changes in eeg frequency bands in non-professional drivers during a simulated driving task. in a descriptive-analytical study, 12 healthy male car drivers took part in a two hour driving session on a simulated monotonous road, whi...

2005
Dennis Longley Mark Branagan

Risk analysis in complex systems must cope with sophisticated threats arising from attackers exploiting security loopholes, or a chain of accidental events triggered by some environmental incident. A security model for complex IT systems, termed the ISM (Information Security Model) stores system and risk information in a database. Associated software uses the database information to develop thr...

2008
Nele Mentens Benedikt Gierlichs Ingrid Verbauwhede

Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead needed to provide reconfigurability. We show that dynamic reconfiguration can also improve the resistance of cryptographic systems against physical attacks. First, we demonstrate how dynamic reconfiguration can reali...

Journal: :Psychophysiology 2012
Xiaoqing Hu Daniel Hegeman Elizabeth Landry J Peter Rosenfeld

UNLABELLED We previously found that simultaneously executing a mental countermeasure and an explicit required response impairs reaction time (RT)-based detection of countermeasure use in a P300- based concealed information test. To address this issue, we increased the numbers of irrelevant stimuli to eight, and manipulated the proportions of to-be-countered irrelevant stimuli from 25% to 50% to...

2009
Matthias Biehl Welf Löwe

When software projects evolve their actual implementation and their intended architecture may drift apart resulting in problems for further maintenance. As a countermeasure it is good software engineering practice to check the implementation against the architectural description for consistency. In this work we check software developed by a Model Driven Software Development (MDSD) process. This...

2006
Martin Boldt Bengt Carlsson

User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also prese...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید