نتایج جستجو برای: fatigue countermeasure
تعداد نتایج: 74370 فیلتر نتایج به سال:
In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application’s co...
Side channels and covert channels can give untrusted applications access to the trusted and sensitive data in order to retrieve private information.. In this poster, we present a countermeasure called the Smartflush against cache-based Side Channel Attacks (SCAs). The Smartflush is a quick-patch countermeasure proposed to counter timing attacks that exploit inclusive caches in Intel’s x86 archi...
The use of random permutation tables as a side-channel attack countermeasure was recently proposed by Coron [6]. The countermeasure operates by ensuring that during the execution of an algorithm, each intermediate variable that is handled is in a permuted form described by the random permutation tables. In this paper, we examine the application of this countermeasure to the AES algorithm as des...
The NHTSA Office of Crash Avoidance Research (OCAR), in conjunction with the Research and Special Programs Administration (RSPA) Volpe National Transportation Systems Center (VNTSC), has underway a multi-disciplinary program to: identify crash causal factors and applicable countermeasure concepts, model target crash scenarios and Intelligent Vehicle Highway System (IVHS) technological intervent...
OBJECTIVE To bridge gaps identified during the 2009 H1N1 influenza pandemic by developing a system that provides public health departments improved capability to manage and track medical countermeasures at the state and local levels and to report their inventory levels to the Centers for Disease Control and Prevention (CDC). MATERIALS AND METHODS The CDC Countermeasure Tracking Systems (CTS) ...
OBJECTIVE Integration of patients' records across resources enhances analytics. To address privacy concerns, emerging strategies such as Bloom filter encodings (BFEs), enable integration while obscuring identifiers. However, recent investigations demonstrate BFEs are, in theory, vulnerable to cryptanalysis when encoded identifiers are randomly selected from a public resource. This study investi...
On smart-cards, Elliptic Curve Cryptosystems (ECC) can be vulnerable to Side Channel Attacks such as the Re ned Power Analysis (RPA). This attack takes advantage of the apparition of special points of the form (0, y). In this paper, we propose a new countermeasure based on co-Z formulæ and an extension of the curve isomorphism countermeasure. It permits to transform the base point P = (x, y) in...
How can virus countermeasures such as software patches or warnings be disseminated and installed more efficiently than they are currently so that fewer organizations will suffer virus infection problems? The relative effectiveness of four anti-virus strategies is examined formally using simulations. One of these strategies is the countermeasure spreading strategy (CMS). CMS is based on the idea...
Much research that occurs within the field of traffic psychology leads to the development of effective road safety countermeasures. There may, however, be psychological research being undertaken in other domains, such as aviation or mining, that has the potential to both provide new directions for, and enhance the effectiveness of, current road safety countermeasures. The purpose of this report...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید