Sciweavers

1236 search results - page 188 / 248
» Programming by Demonstration for Information Agents
Sort
View
SP
2009
IEEE
143views Security Privacy» more  SP 2009»
15 years 5 months ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
—This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how mo...
Bart Coppens, Ingrid Verbauwhede, Koen De Bosscher...
111
Voted
MHCI
2009
Springer
15 years 5 months ago
Mobile implementation of a web 3D carousel with touch input
Mobile devices such as the iPhone provide state of the art interaction capabilities also for web browser applications. Our mobile development is targeted to a Energy Awareness app...
Christoffer Björkskog, Giulio Jacucci, Bruno ...
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
15 years 5 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong
MMSEC
2004
ACM
109views Multimedia» more  MMSEC 2004»
15 years 4 months ago
Statistical characterisation of MP3 encoders for steganalysis
This paper outlines a strategy to discriminate different ISO/ MPEG 1 Audio Layer-3 (MP3) encoding programs by statistical particularities of the compressed audio streams. We use ...
Rainer Böhme, Andreas Westfeld
CASES
2007
ACM
15 years 3 months ago
Non-transparent debugging for software-pipelined loops
This paper tackles the problem of providing correct information about program variable values in a software-pipelined loop through a non-transparent debugging approach. Since mode...
Hugo Venturini, Frédéric Riss, Jean-...