A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Practical Evaluation of FSE 2016 Customized Encoding Countermeasure
2017
IACR Transactions on Symmetric Cryptology
To protect against side-channel attacks, many countermeasures have been proposed. A novel customized encoding countermeasure was published in FSE 2016. ...
In this paper, we implement a full block cipher with customized encoding countermeasure and investigate its security under simulated and practical setting for a general purpose microcontroller. ...
Introduction to Customized Encoding At FSE 2016, Maghrebi et al. [MSB16] proposed a customized encoding countermeasure built according to the precise leakage model based on a stochastic profiling. ...
doi:10.46586/tosc.v2017.i3.108-129
fatcat:ump3sjhftffgrjqo3q634mhk2e
Practical Evaluation of FSE 2016 Customized Encoding Countermeasure
2017
IACR Transactions on Symmetric Cryptology
To protect against side-channel attacks, many countermeasures have been proposed. A novel customized encoding countermeasure was published in FSE 2016. ...
In this paper, we implement a full block cipher with customized encoding countermeasure and investigate its security under simulated and practical setting for a general purpose microcontroller. ...
Introduction to Customized Encoding At FSE 2016, Maghrebi et al. [MSB16] proposed a customized encoding countermeasure built according to the precise leakage model based on a stochastic profiling. ...
doi:10.13154/tosc.v2017.i3.108-129
dblp:journals/tosc/BhasinJP17
fatcat:iub2mgujhjerhmelvqrajy3ami
There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks
[chapter]
2016
Lecture Notes in Computer Science
To counteract it, a recent line of research has investigated the use of software encoding functions such as dual-rail rather than the well known masking countermeasure. ...
A concrete experimentation of our proposal to protect the PRESENT Sbox confirms its practicability. ...
We thank anonymous reviewers of FSE 2016 for the various constructive comments and suggestions. ...
doi:10.1007/978-3-662-52993-5_12
fatcat:zc3ojhwtezhgpnawj3frlxiaji
O-ADPI: Online Adaptive Deep-Packet Inspector Using Mahalanobis Distance Map for Web Service Attacks Classification
2019
IEEE Access
The O-ADPI model was assessed for F-value, true positive rate (TPR), and false positive rate (FPR) in order to evaluate the detectionx performance of O-ADPI against different type of feature selections ...
Selection Engine (FSE) to effectively and efficiently explore optimal subspaces in detecting anomalies embedded deep in the high dimensional feature subspaces. ...
At present, there is inadequate evaluation to countermeasure on REST payload attacks. ...
doi:10.1109/access.2019.2953791
fatcat:aaxqzvcsongyveuemaqc65fbsa
A Survey on Future Internet Security Architectures
2016
IEEE Access
In order to obtain a thorough knowledge of security in future Internet architecture, we review a number of well-known projects, including named data networking, Content Aware Searching Retrieval and sTreaming ...
Current host-centric Internet Protocol (IP) networks are facing unprecedented challenges, such as network attacks and the exhaustion of IP addresses. ...
VOLUME 4, 2016 2) PRIVACY With the rapid development of data mining, privacy has become one of the most important factors to evaluate a new architecture. ...
doi:10.1109/access.2016.2596705
fatcat:ny3dd4naaref7ktsmu32xzosbe
Testing machine learning based systems: a systematic mapping
2020
Empirical Software Engineering
3) their empirical evaluation. ...
MLS testing is a rapidly growing and developing research area, with many open challenges, such as the generation of realistic inputs and the definition of reliable evaluation metrics and benchmarks. ...
To view a copy of this licence, visit http://creativecommonshorg/licenses/by/4.0/. ...
doi:10.1007/s10664-020-09881-0
fatcat:7w42stnm3nfafia7ycbmvhrjou
Bitcoin's APIs in Open-Source Projects: Security Usability Evaluation
2020
Electronics
Furthermore, it evaluates the API usability of Libbitcoin, a well-known C++ implementation of the Bitcoin system, and assesses how the findings of this evaluation could affect the applications that use ...
Insecure coding practices, the complexity of the task in hand, and usability issues, amongst other reasons, make it hard on software developers to maintain secure code. ...
(2016) in [32] , there did not exist any research on the usability of Bitcoin from a developer's perspective by 2016, although the unfriendly nature of Bitcoin's API has been noted by Meva (2016) ...
doi:10.3390/electronics9071077
fatcat:7dgaze5pwjhrvp3nrinwc2vvbq
Research on Third-Party Libraries in AndroidApps: A Taxonomy and Systematic LiteratureReview
[article]
2021
arXiv
pre-print
On the one hand, it can ease the development of mobile apps. ...
of new research directions related to third-party library analysis. ...
[78] 2016 NDSS LibCage [79] 2016 ESORICS LibFinder [80] 2016 S&P LibRadar [41] 2016 ICSE-C LibScout [23] 2016 CCS LibSift [81] 2016 APSEC Pluto [9] 2016 NDSS Li et al. ...
arXiv:2108.03787v1
fatcat:jnj4kvlkuzg3hbgy4pl5wpvle4
WebRanz: web page randomization for better advertisement delivery and web-bot prevention
2016
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering - FSE 2016
We evaluate the effectiveness of We-bRanz and its overhead using 221 randomly sampled top Alexa web pages and 8 representative bot scripts. ...
Despite these benefits to end users, Ad-blockers could be catastrophic for the economic structure underlying the web, especially considering the rise of Ad-blocking as well as the number of technologies ...
EVALUATION In this section, we describe our implementation and evaluate the effectiveness and efficiency of WebRanz in preventing ad-blocking and web bots. ...
doi:10.1145/2950290.2950352
dblp:conf/sigsoft/WangZXKZE16
fatcat:lmkkipjdgzctrmjz6f4enozpwe
Stable isotope ratios of H, C, O, N and S for the geographical traceability of Italian rainbow trout ( Oncorhynchus mykiss )
2018
Food Chemistry
Acknowledgments: The author would like to acknowledge the 20 workpackage leaders and the large number of scientists that contribute to FoodIntegrity from the 60 organisations that participate in the project ...
Currently the two most used countermeasures are visual inspection by experts and DNA analysis. ...
This new assay is currenly offered to the customer worldwide. ...
doi:10.1016/j.foodchem.2017.06.017
pmid:29934170
fatcat:w3a4tqbjm5civnjxs2ax2vlsye
Supporting automated containment checking of software behavioural models
2017
unpublished
The major contributions of this dissertation are novel concepts and techniques for automatic containment checking of software behaviour models. ...
However, the feedback of model checkers is rather not helpful for users with limited background on the underlying formal methods to analyse and understand the causes of consistency violations. ...
Lack of Rigorous Studies, Evaluation, and Practical Impacts Lack of rigorous studies, evaluation, and practical impacts reflect the quality of studies being conducted in the literature of software behavioural ...
doi:10.25365/thesis.47558
fatcat:pqjxp26psfgzlhll6fqybwzp3a
Principle-Driven Continuous Integration: Simplifying Failure Discovery and Raising Anti-Pattern Awareness
2020
The reason is that living up to the recommended practices (called principles) of CI is not easy and developers tend to follow anti-patterns, which are ineffective solutions to recurrent problems. ...
We start with classifying the anti-patterns encountered by developers in practice and identifying their four root causes, which are (i) the poor knowledge of the prerequisites for adopting CI, (ii) the ...
Acknowledgements authors independently validated the resulting sample of 868 issues. ...
doi:10.5167/uzh-197036
fatcat:4xwxho5vtnfezel6hogpmcq2li
Dagstuhl Reports, Volume 8, Issue 1, January 2018, Complete Issue
[article]
2018
Seven emergent topics have been identified ranging from the nature of the GI search space through benchmarking and practical applications. ...
Abstract We document the program and the immediate outcomes of Dagstuhl Seminar 18052 "Genetic Improvement of Software". ...
is encoded adversarially. ...
doi:10.4230/dagrep.8.1
fatcat:dv5ntjliznbs7dwohrcmiwr3lm
Proceedings of the 2021 Joint Workshop of the German Research Training Groups in Computer Science. May 31–June 1, 2021
2021
The goal of these workshops is to foster an interchange of ideas and experiences in order to strengthen the connection within the German computer science community. ...
Initiated in 1996 and run regularly since 2007, researchers of the German Research and Training Groups (RTGs) funded by the Deutsche Forschungsgemeinschaft (DFG) in the field of computer science meet annually ...
FSE 2016, p. 326--337, 2016 3 https://github.com/sosy-lab/sv-witnesses/issues/17
D. Ron and A. Shamir. Quantitative analysis of the full Bitcoin transaction graph. In FC 2013, pages 6-24, 2013. ...
doi:10.25593/opus4-fau-16426
fatcat:isoyq5lzdffxrdqzvkmfsnjgau
Adaptation Timing in Self-Adaptive Systems
2018
of an order of magni [...] ...
of the near future state of the environment to adapt proactively; (ii) considering the latency of adaptation tactics when deciding how to adapt; and (iii) executing tactics concurrently. ...
January 2016 [23] . ...
doi:10.1184/r1/6714578
fatcat:bv5qjkfinffwdnfjyodd3zgk7i
« Previous
Showing results 1 — 15 out of 16 results