Sciweavers

1564 search results - page 229 / 313
» Security in Practice - Security-Usability Chasm
Sort
View
AGENTS
1997
Springer
15 years 2 months ago
Modeling an Environment: Agents in Character Feature Extraction
A feature extraction system based on artificial life concepts is presented. The system provides automatic character feature extraction through the local actions of autonomous feat...
Lijia Zhou, Stan Franklin
CAV
2007
Springer
111views Hardware» more  CAV 2007»
15 years 1 months ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
DAC
2007
ACM
15 years 1 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 1 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
HOST
2009
IEEE
15 years 1 months ago
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage
A PUF or Physical Unclonable Function is a function that is embodied in a physical structure that consists of many random uncontrollable components which originate from process var...
Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schelleke...