نتایج جستجو برای: software countermeasure

تعداد نتایج: 441146  

2003
Stephen Specht Ruby Lee

Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems using them to wage a coordinated large-scale attack against victim systems. As new countermeasures are developed to prevent DDoS attacks and help systems that are victims of such an attack, attackers are constantly devel...

1993
Ronald R. Knipling

The NHTSA Office of Crash Avoidance Research (OCAR), in conjunction with the Research and Special Programs Administration (RSPA) Volpe National Transportation Systems Center (VNTSC), has underway a multi-disciplinary program to: identify crash causal factors and applicable countermeasure concepts, model target crash scenarios and Intelligent Vehicle Highway System (IVHS) technological intervent...

2015
Liora Sahar Guy Faler Emil Hristov Susan Hughes Leslie Lee Caroline Westnedge Benjamin Erickson Barbara Nichols

OBJECTIVE To bridge gaps identified during the 2009 H1N1 influenza pandemic by developing a system that provides public health departments improved capability to manage and track medical countermeasures at the state and local levels and to report their inventory levels to the Centers for Disease Control and Prevention (CDC). MATERIALS AND METHODS The CDC Countermeasure Tracking Systems (CTS) ...

Journal: :Journal of the American Medical Informatics Association : JAMIA 2013
Mehmet Kuzu Murat Kantarcioglu Elizabeth Durham Csaba Tóth Bradley Malin

OBJECTIVE Integration of patients' records across resources enhances analytics. To address privacy concerns, emerging strategies such as Bloom filter encodings (BFEs), enable integration while obscuring identifiers. However, recent investigations demonstrate BFEs are, in theory, vulnerable to cryptanalysis when encoded identifiers are randomly selected from a public resource. This study investi...

2004
Masao Ohira Reishi Yokomori Makoto Sakai Ken-ichi Matsumoto Katsuro Inoue Koji Torii

In recent years, improvement of software process is increasingly gaining attention. However, its practice is very difficult because coherent data collection and utilization of the collected data require considerable experience with software process improvement. In this paper, we describe our empirical approach to software engineering and introduce Empirical Project Monitor (EPM). Collecting dat...

2013
Ali Galip Bayrak Francesco Regazzoni David Novo Paolo Ienne

Security analysis is a crucial concern in the design of hardware and software systems, yet there is a distinct lack of automated methodologies. In this paper, we remedy this situation for the verification of software countermeasure implementations. In this context, verifying the security of a protected implementation against side-channel attacks corresponds to assessing whether any particular l...

2012
Andrew Moss Elisabeth Oswald Dan Page Michael Tunstall

Differential Power Analysis (DPA) attacks find a statistical correlation between the power consumption of a cryptographic device and intermediate values within the computation. Randomization via (Boolean) masking of intermediate values breaks this statistical dependence and thus prevents such attacks (at least up to a certain order). Especially for software implementations, (first-order) maskin...

2012
Jean-Luc Danger Sylvain Guilley Philippe Hoogvorst Cédric Murdica David Naccache

On smart-cards, Elliptic Curve Cryptosystems (ECC) can be vulnerable to Side Channel Attacks such as the Re ned Power Analysis (RPA). This attack takes advantage of the apparition of special points of the form (0, y). In this paper, we propose a new countermeasure based on co-Z formulæ and an extension of the curve isomorphism countermeasure. It permits to transform the base point P = (x, y) in...

2014
C. R. Viau T. Cathala

Electronic countermeasures (ECM) are an essential part of platform protection and survivability. Developing effective countermeasure starts with an in-depth understanding of the physical interactions between the threat, the target, the countermeasures and their environment. A significant amount of this knowledge can be acquired using physics-based modelling and simulation tools. To address the ...

2005
Petar Djekic Claudia Löbbecke

Software piracy has recently gained enormous attention, not only in the context of P2P-networks. As one countermeasure against software piracy, publishers have been implementing Digital Rights Management systems such as technical copy protection measures into their software products. This paper examines the impact of different technical copy protection measures and Internet services usage on so...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید