140
click to vote
CASES
14 years 11 months ago
2010 ACM
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
127
click to vote
CASES
14 years 11 months ago
2010 ACM
Dynamic binary translators (DBTs) are becoming increasingly important because of their power and flexibility. However, the high memory demands of DBTs present an obstacle for all ...
101
click to vote
CASES
14 years 11 months ago
2010 ACM
Common generated instruction selections are based on tree pattern matching, but modern and custom architectures feature instructions, which cannot be covered by trees. To overcome...
133
click to vote
CASES
14 years 11 months ago
2010 ACM
The performance of most embedded systems is critically dependent on the memory hierarchy performance. In particular, higher cache hit rate can provide significant performance boos...
120
click to vote
CASES
14 years 11 months ago
2010 ACM
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
|