146
Voted
CASES
15 years 7 days ago
2010 ACM
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
133
Voted
CASES
15 years 7 days ago
2010 ACM
Dynamic binary translators (DBTs) are becoming increasingly important because of their power and flexibility. However, the high memory demands of DBTs present an obstacle for all ...
108
click to vote
CASES
15 years 7 days ago
2010 ACM
Common generated instruction selections are based on tree pattern matching, but modern and custom architectures feature instructions, which cannot be covered by trees. To overcome...
142
Voted
CASES
15 years 7 days ago
2010 ACM
The performance of most embedded systems is critically dependent on the memory hierarchy performance. In particular, higher cache hit rate can provide significant performance boos...
124
click to vote
CASES
15 years 7 days ago
2010 ACM
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
|