Sciweavers

11 search results - page 2 / 3
» Process Table Covert Channels: Exploitation and Countermeasu...
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
13 years 9 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
ACSAC
2002
IEEE
13 years 8 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
ICIP
2003
IEEE
14 years 5 months ago
JPEG compression history estimation for color images
Given a color image previously compressed using JPEG, we estimate the image's JPEG compression history components including the color transformation, subsampling, and the qua...
Ramesh Neelamani, Ricardo L. de Queiroz, Zhigang F...
SSD
2007
Springer
189views Database» more  SSD 2007»
13 years 9 months ago
Collaborative Spatial Data Sharing Among Mobile Lightweight Devices
Abstract. Mobile devices are increasingly being equipped with wireless peerto-peer (P2P) networking interfaces, rendering the sharing of data among mobile devices feasible and bene...
Zhiyong Huang, Christian S. Jensen, Hua Lu, Beng C...
MICRO
2008
IEEE
139views Hardware» more  MICRO 2008»
13 years 10 months ago
Adaptive data compression for high-performance low-power on-chip networks
With the recent design shift towards increasing the number of processing elements in a chip, high-bandwidth support in on-chip interconnect is essential for low-latency communicat...
Yuho Jin, Ki Hwan Yum, Eun Jung Kim