Leakage

Results: 1395



#Item
51

Unifying Leakage Models: from Probing Attacks to Noisy Leakage Alexandre Duc1,⋆ , Stefan Dziembowski2,3,⋆⋆ , and Sebastian Faust1,⋆ ⋆ ⋆ 1 Ecole Polytechnique F´ed´erale de Lausanne, 1015 Lausanne, Switzerl

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2014-02-07 04:03:10
    52

    Protecting Circuits from Computationally Bounded and Noisy Leakage ∗ Sebastian Faust† EPFL Tal Rabin

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2014-06-30 22:25:10
      53

      LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2⋆ , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      - Date: 2015-08-02 23:01:51
        54

        Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage John Demme Robert Martin Adam Waksman Simha Sethumadhavan Computer Architecture Security and Technology Lab Department of Computer Science, Co

        Add to Reading List

        Source URL: www.cs.columbia.edu

        - Date: 2012-06-11 10:18:08
          55

          Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

          Add to Reading List

          Source URL: www.cs.bham.ac.uk

          - Date: 2013-08-01 12:14:39
            56

            Information Leakage Analysis by Abstract Interpretation Matteo Zanioli1,2 and Agostino Cortesi1 1 2

            Add to Reading List

            Source URL: www.dsi.unive.it

            - Date: 2011-02-07 10:20:50
              57

              A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

              Add to Reading List

              Source URL: www.cs.bham.ac.uk

              - Date: 2013-08-01 12:14:38
                58

                Leakage-Resilient Layout Randomization for Mobile Devices Kjell Braden†§ , Stephen Crane‡ , Lucas Davi† , Michael Franz∗ Per Larsen∗‡ , Christopher Liebchen† , Ahmad-Reza Sadeghi† , † CASED/Technische

                Add to Reading List

                Source URL: www.internetsociety.org

                - Date: 2016-02-22 18:47:19
                  59

                  PETAL: Preset Encoding Table Information Leakage Jiaqi Tan, Jayvardhan Nahata Contact: CMU-PDLApril 2013

                  Add to Reading List

                  Source URL: www.pdl.cmu.edu

                  - Date: 2014-01-28 13:54:50
                    60

                    Physics accessories | Cables and Reels Extension cables Low noise - less than 5 fA leakage Triaxial or coaxial cables Custom lengths & connector configurations

                    Add to Reading List

                    Source URL: www.bestmedicalcanada.com

                    - Date: 2016-06-02 11:47:57
                      UPDATE