Sciweavers

8177 search results - page 9 / 1636
» Detecting System Emulators
Sort
View
89
Voted
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 2 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
60
Voted
CCR
2010
96views more  CCR 2010»
14 years 11 months ago
Dummynet revisited
Dummynet is a widely used link emulator, developed long ago to run experiments in user-configurable network environments. Since its original design, Dummynet has been extended in ...
Marta Carbone, Luigi Rizzo
MASCOTS
2003
15 years 12 days ago
Toward Scaling Network Emulation using Topology Partitioning
Scalability is the primary challenge to studying large complex network systems with network emulation. This paper studies topology partitioning, assigning disjoint pieces of the n...
Ken Yocum, Ethan Eade, Julius Degesys, David Becke...
CSREAESA
2009
15 years 4 days ago
Embedded Processor Based Fault Injection and SEU Emulation for FPGAs
Two embedded processor based fault injection case studies are presented which are applicable to Field Programmable Gate Arrays (FPGAs) and FPGA cores in configurable System-on-Chip...
Bradley F. Dutton, Mustafa Ali, Charles E. Stroud,...