Sciweavers

5578 search results - page 25 / 1116
» Base Class Injection
Sort
View
CODES
2007
IEEE
15 years 4 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
IEEEARES
2007
IEEE
15 years 4 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...
PRDC
2007
IEEE
15 years 4 months ago
Assessment of Message Missing Failures in FlexRay-Based Networks
This paper assesses message missing failures in a FlexRay-based network. The assessment is based on about 35680 bit-flip fault injections inside different parts of the FlexRay com...
Vahid Lari, Mehdi Dehbashi, Seyed Ghassem Miremadi...
DFT
2000
IEEE
119views VLSI» more  DFT 2000»
15 years 2 months ago
An Experimental Evaluation of the Effectiveness of Automatic Rule-Based Transformations for Safety-Critical Applications
1 Over the last years, an increasing number of safety-critical tasks have been demanded to computer systems. In particular, safety-critical computer-based applications are hitting ...
Maurizio Rebaudengo, Matteo Sonza Reorda, Marco To...
DLT
2008
14 years 11 months ago
On a Generalization of Standard Episturmian Morphisms
Abstract. In a recent paper with L. Q. Zamboni the authors introduced the class of -episturmian words, where is an involutory antimorphism of the free monoid A . In this paper, we...
Michelangelo Bucci, Aldo de Luca, Alessandro De Lu...