نتایج جستجو برای: software countermeasure
تعداد نتایج: 441146 فیلتر نتایج به سال:
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems using them to wage a coordinated large-scale attack against victim systems. As new countermeasures are developed to prevent DDoS attacks and help systems that are victims of such an attack, attackers are constantly devel...
The NHTSA Office of Crash Avoidance Research (OCAR), in conjunction with the Research and Special Programs Administration (RSPA) Volpe National Transportation Systems Center (VNTSC), has underway a multi-disciplinary program to: identify crash causal factors and applicable countermeasure concepts, model target crash scenarios and Intelligent Vehicle Highway System (IVHS) technological intervent...
OBJECTIVE To bridge gaps identified during the 2009 H1N1 influenza pandemic by developing a system that provides public health departments improved capability to manage and track medical countermeasures at the state and local levels and to report their inventory levels to the Centers for Disease Control and Prevention (CDC). MATERIALS AND METHODS The CDC Countermeasure Tracking Systems (CTS) ...
OBJECTIVE Integration of patients' records across resources enhances analytics. To address privacy concerns, emerging strategies such as Bloom filter encodings (BFEs), enable integration while obscuring identifiers. However, recent investigations demonstrate BFEs are, in theory, vulnerable to cryptanalysis when encoded identifiers are randomly selected from a public resource. This study investi...
In recent years, improvement of software process is increasingly gaining attention. However, its practice is very difficult because coherent data collection and utilization of the collected data require considerable experience with software process improvement. In this paper, we describe our empirical approach to software engineering and introduce Empirical Project Monitor (EPM). Collecting dat...
Security analysis is a crucial concern in the design of hardware and software systems, yet there is a distinct lack of automated methodologies. In this paper, we remedy this situation for the verification of software countermeasure implementations. In this context, verifying the security of a protected implementation against side-channel attacks corresponds to assessing whether any particular l...
Differential Power Analysis (DPA) attacks find a statistical correlation between the power consumption of a cryptographic device and intermediate values within the computation. Randomization via (Boolean) masking of intermediate values breaks this statistical dependence and thus prevents such attacks (at least up to a certain order). Especially for software implementations, (first-order) maskin...
On smart-cards, Elliptic Curve Cryptosystems (ECC) can be vulnerable to Side Channel Attacks such as the Re ned Power Analysis (RPA). This attack takes advantage of the apparition of special points of the form (0, y). In this paper, we propose a new countermeasure based on co-Z formulæ and an extension of the curve isomorphism countermeasure. It permits to transform the base point P = (x, y) in...
Electronic countermeasures (ECM) are an essential part of platform protection and survivability. Developing effective countermeasure starts with an in-depth understanding of the physical interactions between the threat, the target, the countermeasures and their environment. A significant amount of this knowledge can be acquired using physics-based modelling and simulation tools. To address the ...
Software piracy has recently gained enormous attention, not only in the context of P2P-networks. As one countermeasure against software piracy, publishers have been implementing Digital Rights Management systems such as technical copy protection measures into their software products. This paper examines the impact of different technical copy protection measures and Internet services usage on so...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید