Sciweavers

2236 search results - page 172 / 448
» Secure Software Design in Practice
Sort
View
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 10 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
ACSAC
2007
IEEE
15 years 8 months ago
Toward a Medium-Robustness Separation Kernel Protection Profile
A protection profile for high-robustness separation kernels has recently been validated and several implementations are under development. However, medium-robustness separation ke...
Rance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine...
ICISC
2009
132views Cryptology» more  ICISC 2009»
15 years 1 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
OZCHI
2005
ACM
15 years 9 months ago
Spy-resistant keyboard: more secure password entry on public touch screen displays
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering priv...
Desney S. Tan, Pedram Keyani, Mary Czerwinski
158
Voted
ICSE
2005
IEEE-ACM
16 years 4 months ago
A cross-program investigation of students' perceptions of agile methods
Research was conducted on using agile methods in software engineering education. This paper explores the perceptions of students from five different academic levels of agile pract...
Grigori Melnik, Frank Maurer