Sciweavers

1369 search results - page 91 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ACSAC
2003
IEEE
15 years 4 months ago
Making Secure TCP Connections Resistant to Server Failures
Methods are presented to increase resiliency to server failures by migrating long running, secure TCP-based connections to backup servers, thus mitigating damage from servers disa...
Hailin Wu, Andrew Burt, Ramki Thurimella
IJNSEC
2008
137views more  IJNSEC 2008»
14 years 11 months ago
Baseline Profile Stability for Network Anomaly Detection
Network attacks are commonplace in the Internet. One of the defense mechanisms against the network attacks is using a baseline profile established during normal operation to detec...
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh
CHES
2005
Springer
82views Cryptology» more  CHES 2005»
15 years 4 months ago
Masking at Gate Level in the Presence of Glitches
Abstract. It has recently been shown that logic circuits in the implementation of cryptographic algorithms, although protected by “secure” random masking schemes, leak side-cha...
Wieland Fischer, Berndt M. Gammel
TASE
2009
IEEE
15 years 5 months ago
Environmental Simulation of Real-Time Systems with Nested Interrupts
Interrupts are important aspects of real-time embedded systems to handle events in time. When there exist nested interrupts in a real-time system, and an urgent interrupt is allow...
Guoqiang Li, Shoji Yuen, Masakazu Adachi
SPIN
2004
Springer
15 years 4 months ago
Black-Box Conformance Testing for Real-Time Systems
We propose a new framework for black-box conformance testing of real-time systems, where specifications are modeled as nondeterministic and partially-observable timed automata. We...
Moez Krichen, Stavros Tripakis