نتایج جستجو برای: multiple byte fault

تعداد نتایج: 821636  

Journal: :Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2021

1997
I-Cheng K. Chen Peter L. Bird Trevor Mudge

In this paper we present a straightforward technique for compressing the instruction stream for programs that overcomes some of the limitations of earlier proposals. After code generation, the instruction stream is analysed for frequently used sequences of instructions from within the program’s basic blocks. These patterns of multiple instructions are then mapped into single byte opcodes. This ...

Journal: :Preview 2021

We can add Anders Celsius to the list of scientists whose names are used as SI units, (1701 - 44) was a Swedish astronomer, physicist and mathematician. He gave his name qu...

2003
Kiran Nagaraja Neeraj Krishnan Ricardo Bianchini Richard P. Martin Thu D. Nguyen

We consider the impact of different communication architectures on the performability (performance + availability) of cluster-based servers. In particular, we use a combination of fault-injection experiments and analytic modeling to evaluate the performability of two popular communication protocols, TCP and VIA, as the intra-cluster communication substrate of a sophisticated Web server. Our ana...

Journal: :Computers & Security 2011
Qijun Gu Christopher Ferguson Rizwan Noorani

Since sensor applications are implemented in embedded computer systems, cyber attacks that compromise regular computer systems via exploiting memory-related vulnerabilities present similar threats to sensor networks. However, the paper shows that memory fault attacks in sensors are not the same as in regular computers due to sensor’s hardware and software architecture. In contrast to worm attac...

2011
Leon Wu Gail Kaiser

Mutation testing applies mutation operators to modify program source code or byte code in small ways, and then runs these modified programs (i.e., mutants) against a test suite in order to evaluate the quality of the test suite. In this paper, we first describe a general fault model for concurrent programs and some limitations of previously developed sets of first-order concurrency mutation ope...

Journal: :I. J. Network Security 2018
Gitika Maity Jaydeb Bhaumik Anjan Kundu

In recent years, Differential Fault Analysis (DFA) has been proven as the most efficient technique to attack any block cipher by introducing a computational error. In this paper, a new Substitution Permutation Network (SPN) type architecture is proposed which has better resistance against DFA as compared to Advanced Encryption Standard (AES). The proposed architecture is similar to AES except r...

Journal: :IACR Cryptology ePrint Archive 2012
Subidh Ali Debdeep Mukhopadhyay

In this paper we propose a new differential fault analysis (DFA) on CLEFIA of 128-bit key. The proposed attack requires to induce byte faults at the fourteenth round of CLEFIA encryption. The attack uses only two pairs of fault-free and faulty ciphertexts and uniquely determines the 128-bit secret key. The attacker does not need to know the plaintext. The most efficient reported fault attack on...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده برق و کامپیوتر 1388

با توجه به این که در سیستم های صنعتی وقوع fault ممکن است منجر به خرابی کالا، خرابی دستگاه، افت عملکرد و یا تلفات جانی شود، شناسایی و تشخیص به موقع fault و همچنین جبران سازی آن از اهمیت کاربردی بسیار بالایی برخوردار می باشد. عمده ی سیستم های صنعتی را سیستم های غیر خطی و هایبرید با ورودی ها یا حالت های ناهمگون تشکیل می دهند. بنابراین شناسایی fault در این سیستم ها و تلاش برای جبران اثرات آن به کمک...

Journal: :IEEE Transactions on Parallel and Distributed Systems 2021

In this article, we propose Failure-atomic Byte-addressable R-tree (FBR-tree) that leverages the byte-addressability, persistence, and high performance of persistent memory while guaranteeing crash consistency. We carefully control order store cacheline flush instructions prevent any single instruction from making an FBR-tree inconsistent unrecoverable. also develop a non-blocking lock-free ran...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید