نتایج جستجو برای: leakage flow

تعداد نتایج: 510394  

2004
Giovanni Facchini Assaf Razin Gerald Willmann

This paper analyzes the interaction between the welfare state and immigration policy. We establish a negative relationship between the number of dependents and the extent of the welfare state due to the leakage of benefits. We also explain the determination of immigration policy as the outcome of a lobbying game between domestic interest groups and the government. Our results indicate that ther...

2003
E. J. Miller D. M. Schaadt E. T. Yu J. S. Speck

An electrochemical surface treatment has been developed that decreases the reverse-bias leakage current in Schottky diodes fabricated on GaN grown by molecular-beam epitaxy ~MBE!. This treatment suppresses current flow through localized leakage paths present in MBE-grown GaN, while leaving other diode characteristics, such as the Schottky barrier height, largely unaffected. A reduction in leaka...

2017
Lu Zhang Wei Hu Armaiti Ardeshiricham Yu Tai Jeremy Blackstone Dejun Mu Ryan Kastner

High-level synthesis (HLS) allows hardware designers to think algorithmically and not worry about low-level, cycleby-cycle details. This provides the ability to quickly explore the architectural design space and tradeoff between resource utilization and performance. Unfortunately, security evaluation is not a standard part of the HLS design flow. In this work, we aim to understand the effects o...

2017
Mário S. Alvim Konstantinos Chatzikokolakis Yusuke Kawamoto Catuscia Palamidessi

We formalize the interplay between defender and adversary in a game-theoretic framework adapted to the specific issues of quantitative information flow. Assuming that both defender and adversary may be active and influence the system during the attack, we define a general framework of information leakage games in which the payoff function of the game is information leakage. We provide methods f...

2016
M.Ranjani B.Prabakaran

1PG Scholar, Department of EEE, Sri Shakthi Institute of Engineering and Technology, Tamilnadu, Indian 2Assistant Professor, Department of EEE, Sri Shakthi Institute of Engineering and Technology, Tamilnadu, Indian ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Due to the decade of fossil fuel ...

2012
Pascal Andreas Meinerzhagen Oskar Andersson Babak Mohammadi S. M. Yasser Sherazi Andreas Peter Burg Joachim Neves Rodrigues

Ultra-low power (ULP) biomedical implants and sensor nodes typically require small memories of a few kb, while previous work on reliable subthreshold (sub-VT) memories targets several hundreds of kb. Standard-cell based memories (SCMs) are a straightforward approach to realize robust subVT storage arrays and fill the gap of missing sub-VT memory compilers. This paper presents an ultra-low-leaka...

2010
Catuscia Palamidessi Mário S. Alvim Miguel E. Andrés

In recent years, there has been a growing interest in considering the quantitative aspects of Information Flow, partly because often the a priori knowledge of the secret information can be represented by a probability distribution, and partly because the mechanisms to protect the information may use randomization to obfuscate the relation between the secrets and the observables. We consider the...

2015
Stephen Crane Andrei Homescu Stefan Brunthaler Per Larsen Michael Franz

We explore software diversity as a defense against side-channel attacks by dynamically and systematically randomizing the control flow of programs. Existing software diversity techniques transform each program trace identically. Our diversity based technique instead transforms programs to make each program trace unique. This approach offers probabilistic protection against both online and off-l...

Journal: :Journal of Computer Security 2015
Mário S. Alvim Miguel E. Andrés Konstantinos Chatzikokolakis Pierpaolo Degano Catuscia Palamidessi

Differential privacy aims at protecting the privacy of participants in statistical databases. Roughly, a mechanism satisfies differential privacy if the presence or value of a single individual in the database does not significantly change the likelihood of obtaining a certain answer to any statistical query posed by a data analyst. Differentially-private mechanisms are often oblivious: first t...

2009
Jiashu Sun Saumitra K. Vajandar Dongyan Xu Yuejun Kang Guoqing Hu Deyu Li

Poly(dimethylsiloxane) (PDMS) is usually considered as a dielectric material and the PDMS microchannel wall can be treated as an electrically insulated boundary in an applied electric field. However, in certain layouts of microfluidic networks, electrical leakage through the PDMS microfluidic channel walls may not be negligible, which must be carefully considered in the microfluidic circuit des...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید