Sciweavers

2945 search results - page 9 / 589
» Designing and Implementing Malicious Hardware
Sort
View
123
Voted
FPGA
2008
ACM
161views FPGA» more  FPGA 2008»
15 years 1 months ago
Implementing high-speed string matching hardware for network intrusion detection systems
This paper presents high-throughput techniques for implementing FSM based string matching hardware on FPGAs. By taking advantage of the fact that string matching operations for di...
Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning ...
SUTC
2010
IEEE
14 years 10 months ago
Hardware Implementation of Symbol Synchronization for Underwater FSK
—— Symbol synchronization is a critical component in the design of an underwater acoustic modem. Without accurate symbol synchronization, higher bit error rates incur thus reduc...
Ying Li, Xing Zhang, Bridget Benson, Ryan Kastner
ALIFE
2002
14 years 11 months ago
An Interactive Self-Replicator Implemented in Hardware
Self-replicating loops presented to date are essentially worlds unto themselves, inaccessible to the observer once the replication process is launched. In this article we present t...
André Stauffer, Moshe Sipper
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 6 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
FPGA
2007
ACM
124views FPGA» more  FPGA 2007»
15 years 3 months ago
Efficient hardware checkpointing: concepts, overhead analysis, and implementation
Progress in reconfigurable hardware technology allows the implementation of complete SoCs in today's FPGAs. In the context design for reliability, software checkpointing is a...
Dirk Koch, Christian Haubelt, Jürgen Teich