Hardware security

Results: 1760



#Item
91Hardware description languages / Turing machine / Formal methods / Theoretical computer science / Verilog / VHDL / Turing completeness / NP / Formal verification / High-level synthesis / Verilog-AMS

Safety to the Weak! Security Through Feebleness: An Unorthodox Manifesto Rick McGeer, US Ignite Outline

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:40:05
92Central processing unit / Pointer / Instruction set

Micro-Policies A Framework for Verified, Hardware-Assisted Security Monitors Cătălin Hrițcu INRIA Paris

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2015-05-22 07:30:22
93Web hosting / VMware ESXi / Virtual private server / Virtual Iron / Hyper-V / VMware / Virtual machine / Hardware virtualization / Virtualization / Dedicated hosting service / Xen / Virtual security switch

Genesis Hosting Solutions, LLC Table of Contents Introduction.......................................................................................................................... 3 Our capabilities................

Add to Reading List

Source URL: www.genesishosting.com

Language: English - Date: 2009-02-08 21:22:11
94Computer architecture / Computing / Computer engineering / Central processing unit / Instruction set architectures / Processor register / Itanium / X86 / CPU cache / Optimizing compiler / 64-bit computing / Pointer

From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware Haibo Chen† , Xi Wu† , Liwei Yuan† , Binyu Zang† , Pen-chung Yew‡ , and Frederic T. Chong§ † ‡

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:08
95Pseudorandom number generators / Kleptography / National Institute of Standards and Technology / National Security Agency / Cryptography / NIST SP 800-90A / Random number generation / Hardware random number generator / Entropy / Dual EC DRBG / RdRand

Draft SP 800-90C, Recommendation for Random Bit Generator (RBG) Constructions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-13 09:06:18
96

INSE 6150 Lecture Notes Lecture 11: Human Procedures (cont.) and Hardware Security Course Instructor: Prof. Jeremy Clark Scribed by: Kobra (Ava) Khanmohammadi Concordia University, winter 2014

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2014-04-08 12:02:30
    97

    Automation Support for Security Control Assessments. Volume 2: Hardware Asset Management

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-02-02 12:17:39
      98Cryptographic software / Hardware virtualization / Heartbleed / Internet security / Transport Layer Security / OpenSSL / Hypervisor / Hyper-V / Protection ring / Second Level Address Translation / Rootkit / Operating system

      Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

      Add to Reading List

      Source URL: ipads.se.sjtu.edu.cn

      Language: English - Date: 2015-08-16 21:09:13
      99

      Software Security Hardware Firmware Applications       OS  

      Add to Reading List

      Source URL: users.encs.concordia.ca

      Language: English - Date: 2014-03-17 15:07:12
        100Computing / Technology / Network protocols / Wireless networking / Networking hardware / Computer network security / Port forwarding / Routing / Universal Plug and Play / Wi-Fi / Ethernet / Router

        LS-PTC300 CAMERA MANUAL Hardware Installation 1) Insert the power cable and the Wi-Fi antenna into their respective ports on the camera. Tighten the Wi-Fi antenna until it is secure and not loose. 2) Insert one end of t

        Add to Reading List

        Source URL: www.lockstate.com

        Language: English - Date: 2015-04-30 17:25:58
        UPDATE