搜索结果: 1-5 共查到“军事学 exploitation”相关记录5条 . 查询时间(0.252 秒)
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
Side-channel analysis location leakage microprobe
2019/3/4
Near-field microprobes have the capability to isolate small regions of a chip surface and enable precise measurements with high spatial resolution. Being able to distinguish the activity of small regi...
Process Table Covert Channels: Exploitation and Countermeasures
Exploitation Countermeasures
2016/3/2
How to securely run untrusted software? A typical answer
is to try to isolate the actual effects this software might have. Such
counter-measures can take the form of memory segmentation, sandboxing
...
Towards Leakage Exploitation Rate Optimality in Template Attack
Cryptography Side-Channel Attacks
2014/3/7
Template Attack is widely accepted to be one of the most powerful side-channel attacks, because it is usually assumed that one has a full knowledge of the targeted crypto devices and thus be well capa...
Power and Timing Side Channels for PUFs and their Efficient Exploitation
Modeling Attacks Power Side Channel
2014/3/5
We discuss the first power and timing side channels on Strong Physical Unclonable Functions (Strong PUFs) in the literature, and describe their efficient exploitation via adapted machine learning (ML)...
[美国《防务世界》2006年6月5日报道] BAE系统公司SOCET GXP(TM)软件新版本中增加了图像分析、地理空间分析,3D仿真和目标获取等功能,这些功能可有效应用于本土防御和军队情报任务中,比如灾难救济和恢复、人道主义救援、侦察、战斗毁伤评估和监视任务等。