Sciweavers

1369 search results - page 87 / 274
» A Practical Implementation of the Timing Attack
Sort
View
CCS
2006
ACM
15 years 2 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang
FPL
2007
Springer
105views Hardware» more  FPL 2007»
15 years 5 months ago
Time Predictable CPU and DMA Shared Memory Access
In this paper, we propose a first step towards a time predictable computer architecture for single-chip multiprocessing (CMP). CMP is the actual trend in server and desktop syste...
Christof Pitter, Martin Schoeberl
IJNSEC
2008
117views more  IJNSEC 2008»
14 years 11 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
CSREASAM
2006
15 years 14 days ago
A Proposal of One-Time Biometric Authentication
- In biometric authentication, feature information of each enrolled person's biometric information is enrolled as templates. Secure databases or anti-tampered devices store th...
Yoshifumi Ueshige, Kouichi Sakurai
ICCD
2006
IEEE
103views Hardware» more  ICCD 2006»
15 years 8 months ago
Architectural Support for Run-Time Validation of Control Flow Transfer
—Current micro-architecture blindly uses the address in the program counter to fetch and execute instructions without validating its legitimacy. Whenever this blind-folded instru...
Yixin Shi, Sean Dempsey, Gyungho Lee