Sciweavers

586 search results - page 3 / 118
» Witnessing side effects
Sort
View
USS
2004
14 years 11 months ago
Side Effects Are Not Sufficient to Authenticate Software
Kennell and Jamieson [KJ03] recently introduced the Genuinity system for authenticating trusted software on a remote machine without using trusted hardware. Genuinity relies on ma...
Umesh Shankar, Monica Chew, J. D. Tygar
CHI
2011
ACM
14 years 1 months ago
Side effects and "gateway" tools: advocating a broader look at evaluating persuasive systems
This paper argues for evaluating the impact of persuasive systems on users beyond metrics that focus on system usage, based on an interview study of 16 Wii Fit users. While explor...
Victoria Schwanda, Steven Ibara, Lindsay Reynolds,...
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
15 years 10 months ago
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
Abstract. The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, mal...
Christof Paar, Lang Lin, Markus Kasper, Tim Gü...
74
Voted
SCAM
2009
IEEE
15 years 4 months ago
Improving Side-Effect Analysis with Lazy Access Path Resolving
Ju Qian, Yuming Zhou, Baowen Xu