Sciweavers

981 search results - page 82 / 197
» Semantics-aware trace analysis
Sort
View
ITCC
2005
IEEE
15 years 8 months ago
On the Masking Countermeasure and Higher-Order Power Analysis Attacks
Abstract— Masking is a general method used to thwart Differential Power Analysis, in which all the intermediate data inside an implementation are XORed with random Boolean values...
François-Xavier Standaert, Eric Peeters, Je...
ISSTA
2010
ACM
15 years 5 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...
CORR
2010
Springer
88views Education» more  CORR 2010»
15 years 3 months ago
Dynamic and Transparent Analysis of Commodity Production Systems
We propose a framework that provides a programming interface to perform complex dynamic system-level analyses of deployed production systems. By leveraging hardware support for vi...
Aristide Fattori, Roberto Paleari, Lorenzo Martign...
COMCOM
2006
151views more  COMCOM 2006»
15 years 3 months ago
Characteristic analysis of internet traffic from the perspective of flows
The necessity of network traffic monitoring and analysis is growing dramatically with increasing network usage demands from individual users as well as business communities. Most ...
Myung-Sup Kim, Young J. Won, James W. Hong
TRETS
2010
142views more  TRETS 2010»
15 years 1 months ago
Performance Analysis Framework for High-Level Language Applications in Reconfigurable Computing
s, and abstractions, typically enabling faster development times than with traditional Hardware ion Languages (HDLs). However, programming at a higher level of abstraction is typic...
John Curreri, Seth Koehler, Alan D. George, Brian ...