نتایج جستجو برای: run time leakage
تعداد نتایج: 1977427 فیلتر نتایج به سال:
Stack Smashing Attacks Arash Baratloo and Navjot Singh farash,[email protected] Bell Labs Research, Lucent Technologies 600 Mountain Ave Murray Hill, NJ 07974 USA Timothy Tsai [email protected] Reliable Software Technologies 21351 Ridgetop Circle, Suite 400 Dulles, VA 20166 USA Abstract The exploitation of bu er over ow vulnerabilities in process stacks constitutes a signi cant port...
Overgaard, Kristian, Tue Lindstrøm, Thorsten Ingemann-Hansen, and Torben Clausen. Membrane leakage and increased content of Na -K pumps and Ca2 in human muscle after a 100-km run. J Appl Physiol 92: 1891–1898, 2002. First published January 4, 2002; 10.1152/japplphysiol.00669. 2001.—During prolonged exercise, changes in the ionic milieu in and surrounding the muscle fibers may lead to fatigue or...
Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows
Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a ‘single responsibility principle’ design makes them well suited for constructing scalable and flexible data integration and real-time data flow applications. In this paper, we investigate mic...
0
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to “side-channel attacks” which exploit leakage of information about the secret internal state. In this work we put forward the notion of “leakage-resilient signatures,” which strengthens the standard security notion by gi...
We describe a pitch tracking method based on a time delay estimation technique. Given two frames of voiced speech and it’s time delay, we will run a linear regression on the unwrapped phase of the quotient of the spectrum of both frames. A weighted linear regression will allow us to avoid the effect of phases corrupted by spectral leakage and noise. Iterations adapting the frame length will all...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید