نتایج جستجو برای: software countermeasure

تعداد نتایج: 441146  

2008
Yu Yan

The market share of railway transportation is in the downwards trend. In order to reverse this trend, the railway has taken a series of countermeasures which have resulted in obvious effects. 1.To set up the railway freight and passenger transport marketing system which can meet the requirement of market. 2.To make the railway transport enterprises operational mechanism be matched with market e...

2011
Guillaume Bouffard Jean-Louis Lanet Jean-Baptiste Machemie Jean-Yves Poichotte Jean-Philippe Wary

The ability of Java Cards to withstand attacks is based on software and hardware countermeasures, and on the ability of the Java platform to check the correct behavior of Java code (by using byte code verification). Recently, the idea of combining logical attacks with a physical attack in order to bypass byte code verification has emerged. For instance, correct and legitimate Java Card applicat...

2002
Sooyoung Kim Sooyoung Kim Shin Kwangjae Lim Kwonhue Choi

Sooyoung Kim Shin et al. 31 In high-speed multimedia satellite communication systems, it is essential to provide high-quality, economical services by using efficient transmission schemes which can overcome channel impairments appearing in the satellite link. This paper introduces techniques to compensate for rain attenuation and the Doppler shift in the satellite communication link. An adaptive...

Albert Ford Eugene Vida Maina Michael Robinson,

The Highway Safety Manual [HSM, 2010] recommends safety evaluations be performed before implementing any roadway treatment to predict the expected safety consequences. Safety consequences can be measured using crash prediction models, Crash Modification Factor (CMFs), or both. This paper develops a CMF to show the expected impact of red-light cameras (RLCs) on safety at signalized intersections...

2009
Markus Kasper Timo Kasper Amir Moradi Christof Paar

We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless entry (RKE) systems based on KeeLoq. We analyze implementations of KeeLoq on microcontrollers and exploit timing vulnerabilities to develop an attack that allows for a practical key recovery within seconds of computati...

2008
Patryk Szewczyk

SoHo users are increasingly faced with the dilemma of applying appropriate security mechanisms to their computer with little or no knowledge of which countermeasure will deal with which potential threat. As problematic as it may seem for individuals to apply appropriate safeguards, individuals with malicious intent are advancing methods by which malicious software may operate undetected on a ta...

2010
Ahmadou Al Khary Séré Julien Iguchi-Cartigny Jean-Louis Lanet

The resistance of Java Card against attack is based on software and hardware countermeasures, and the ability of the Java platform to check the correct behaviour of Java code (by using bytecode verification for instance). Recently, the idea to combine logical attacks with a physical attack in order to bypass bytecode verification has emerged. For instance, correct and legitimate Java Card appli...

2014
Sheeba Armoogum Nawaz Mohamudally

VoIP systems is the new voice communication technology and is playing a key role in various sectors (Government, business, education etc) for the development of a country. Unfortunately, industry and academic researchers find difficulties to evaluate existing systems with focus on security to countermeasure the various attacks for either implementation in a real operator or future enhancement. ...

2015
Ping Chen Jun Xu Zhiqiang Lin Dongyan Xu Bing Mao Peng Liu

Attackers often corrupt data structures to compromise software systems. As a countermeasure, data structure layout randomization has been proposed. Unfortunately, existing techniques require manual designation of randomize-able data structures without guaranteeing the correctness and keep the layout unchanged at runtime. We present a system, called SALADS, that automatically translates a progra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید