8,655 Hits in 3.9 sec

Preventing serialization vulnerabilities through transient field detection

Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke
2021 ACM Symposium on Applied Computing  
Developers need thereby to indicate manually the transient keyword whenever an object field should not be part of the serialization.  ...  In particular, field values encoding memory addresses can leave severe vulnerabilities inside applications if they are not explicitly declared transient.  ...  Preventing Serialization Vulnerabilities through Transient Field Detection SAC '21, March 22-26, 2021, Virtual Event, Republic of Korea 1 JNIEXPORT void JNICALL field_setter(JNIEnv * env, jobject thisObj  ... 
doi:10.1145/3412841.3442033 dblp:conf/sac/GrauxLTW21 fatcat:tx677j3pjzbfpejlixgordlbey

A Systematic Evaluation of Transient Execution Attacks and Defenses [article]

Claudio Canella and Jo Van Bulck and Michael Schwarz and Moritz Lipp and Benjamin von Berg and Philipp Ortner and Frank Piessens and Dmitry Evtyushkin and Daniel Gruss
2019 arXiv   pre-print
In this paper, we present a systematization of transient execution attacks.  ...  We evaluate the attacks in our classification tree through proof-of-concept implementations on 3 major CPU vendors (Intel, AMD, ARM).  ...  In the case of misspeculation, the pointer is zeroed out, preventing it from leaking data through speculative execution.  ... 
arXiv:1811.05441v3 fatcat:pbsyzjdmozauvmuoz52ewg26ii

A Framework to Secure Peripherals at Runtime [chapter]

Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou
2014 Lecture Notes in Computer Science  
BARM [10] aims to detect and prevent DMA-based attacks. It is based on modeling the expected memory bus activity and comparing it to the actual activity.  ...  To read a word, we write a 1b to the Start Read field. The NIC reads the word from the EEPROM and places it in the Read Data field and then sets the Read Done field to 1b.  ... 
doi:10.1007/978-3-319-11203-9_13 fatcat:bamefctgaffabm62rgekgz5bim

SMCV: a Methodology for Detecting Transient Faults in Multicore Clusters

Diego Montezanti, Fernando Emmanuel Frati, Dolores Rexachs, Emilio Luque, Marcelo Naiouf, Armando De Giusti
2012 CLEI Electronic Journal  
This carries a growing vulnerability to transient faults, which increase their impact on multicore clusters running large scientific parallel applications.  ...  This paper introduces SMCV, which is a fully distributed technique that provides fault detection for message-passing parallel applications, by validating the contents of the messages to be sent, preventing  ...  These factors, added to a decrease in supply voltage, cause processors to be more vulnerable to transient faults [14, 17] .  ... 
doi:10.19153/cleiej.15.3.5 fatcat:hhkz5ro275b7viszgynbvalwte

Early Detection of Vulnerable Atherosclerotic Plaque for Risk Reduction of Acute Aortic Rupture and Thromboemboli and Atheroemboli Using Non-Obstructive Angioscopy

Sei Komatsu, Tomoki Ohara, Satoru Takahashi, Mitsuhiko Takewa, Hitoshi Minamiguchi, Atsuko Imai, Yasuhiko Kobayashi, Nobuzo Iwa, Chikao Yutani, Atsushi Hirayama, Kazuhisa Kodama
2015 Circulation Journal  
Serial images of aortic vulnerable plaque. Three waves of thrombi (blue, black, and white arrows) ripple, one by one.  ...  These waves move from the right side to the left side through the center of the visual field and then scatter like cotton or dandelion fuzz.  ... 
doi:10.1253/circj.cj-15-0126 pmid:25766407 fatcat:fmargpfeafaszaylaowpkdfdla

The Research on Intelligent Component Immunity Testing Method of Intelligent Substation

Tongwei Yu, Xingchao Yang
2015 International Journal of Smart Home  
This operation is mainly monitoring the transient magnetic field level of 220kV GIS space and the transient potential rise of 220kV GIS shell when the main transformer is invested.  ...  So does the transient harassment level of 110V DC power port. The main wiring diagram is as shown in Figure 1 .  ...  Electrical Fast Transient Burst Immunity Detection The reason of electrical fast transient (EFT) pulse interference is disconnect inductive load (or through to the perceptual load), because the perceptual  ... 
doi:10.14257/ijsh.2015.9.8.03 fatcat:rnohnrvxaff7ji5bza426eea2m

Calpain Activity in the Rat Brain after Transient Forebrain Ischemia

Robert W. Neumar, Frank H. Meng, Angela M. Mills, Y.Anne Xu, Chen Zhang, Frank A. Welsh, Robert Siman
2001 Experimental Neurology  
Immunohistochemical analysis revealed that calpain activity was primarily localized to dendritic fields of selectively vulnerable neurons at one hour after reperfusion.  ...  This study examined the temporal and spatial characteristics of brain calpain activity after transient forebrain ischemia (TFI) in rats.  ...  Common to all regions was the observation that post-ischemic calpain activity in the dendritic fields of selectively vulnerable neurons precedes both dendritic fragmentation and histologic evidence of  ... 
doi:10.1006/exnr.2001.7708 pmid:11421581 fatcat:mhhr7o6jtbe7blvtsnwzawaxn4

Characterization of the error resiliency of power grid substation devices

Kuan-Yu Tseng, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer
2012 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)  
The goal is to test the ability of these systems to compute through errors/faults.  ...  However, the security and reliability of these microprocessor-based systems is a significant issue, since they are more susceptible to transient errors and malicious attacks.  ...  CONCLUSIONS This paper evaluates the robustness of power grid substation devices in the face of transient errors and malicious attacks.  ... 
doi:10.1109/dsn.2012.6263924 dblp:conf/dsn/TsengCKI12 fatcat:445buepi2bcifb7liwltpe7zza

Interleukin 3 Prevents Delayed Neuronal Death in the Hippocampal CA1 Field

Tong-Chun Wen, Junya Tanaka, Hui Peng, Junzo Desaki, Seiji Matsuda, Nobuji Maeda, Hiroko Fujita, Kohji Sato, Masahiro Sakanaka
1998 Journal of Experimental Medicine  
These findings suggest that IL-3 prevents delayed neuronal death in the hippocampal CA1 field through a receptor-mediated expression of Bclx L protein, which is known to facilitate neuron survival.  ...  The neuroprotective action of IL-3 appeared to be mediated by a postischemic transient upregulation of the IL-3R ␣ subunit in the hippocampal CA1 field where IL-3R ␣ was barely detectable under normal  ...  The above in vivo studies suggest that IL-3 prevents delayed neuronal death in the hippocampal CA1 field through a receptor-mediated expression of Bcl-x L protein.  ... 
doi:10.1084/jem.188.4.635 pmid:9705946 pmcid:PMC2213360 fatcat:buymbabuufbfjn634cfwunwqdy

Discussion on Test Method of Detectors for Flammable Gases

Yu Zhao, Wen-qing Wang
2013 Procedia Engineering  
The paper discussed mainly two aspects when testing detection performances of detectors for flammable gases, measuring principle of sensors and application environment of detectors.  ...  For different kinds of sensors, the performance characteristics decide immunity from interference of temperature and other gas, and according to application field, some special tests, for example, EMC  ...  immunity test, electrical fast transient/burst immunity test, surge immunity test, immunity to conducted disturbances, induced by radio frequency fields, and so on.  ... 
doi:10.1016/j.proeng.2013.02.197 fatcat:3ajqi4jupze5pdpbdu5tusziyi

Proposal for an architecture for TUMULT based on a serial data link

J Scholten, J Hofstede, G.J.M Smit
1987 Microprocessing and Microprogramming  
Exchange of data is by means of message passing through an interprocessor communication network (IPC).  ...  Two main types of access control mechanism exist; the first type is based on collision detection, the second on collision prevention.  ...  Transient failures are caused by the unreliability of the medium. They may be detected and corrected by parity checks, checksums etc.  ... 
doi:10.1016/0165-6074(87)90098-6 fatcat:hus6aqdm35hfvm7cxxb7kwgxlu

Hardware Trojan: Threats and emerging solutions

Rajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia
2009 2009 IEEE International High Level Design Validation and Test Workshop  
We present a Trojan taxonomy, models of Trojan operations and a review of the state-of-the-art Trojan prevention and detection techniques.  ...  Conventional design-time verification and post-manufacturing testing cannot be readily extended to detect hardware Trojans due to their stealthy nature, inordinately large number of possible instances  ...  Another approach based (a) Power-Supply Transient Based Trojan Detection [23] (b) Path Delay Fingerprint Technique [24] on measurement of power-supply transient signal is described in [23] , where  ... 
doi:10.1109/hldvt.2009.5340158 dblp:conf/hldvt/ChakrabortyNB09 fatcat:nwfljlx2eva75nrzu7bkgjvqdi

Evasive Internet: Reducing Internet Vulnerability through Transient Addressing

Michael Rabinovich, Oliver Spatscheck
2010 2010 INFOCOM IEEE Conference on Computer Communications Workshops  
This paper presents our vision for Evasive Internet, where destinations are only reachable through capabilities, which serve as hosts' flat transient addresses.  ...  Our design supports in-network authentication of transient addresses and attribution of traffic they generate; our design further gives hosts full control over incoming flows.  ...  CONCLUSION The paper outlines our vision of an Evasive Internet -a network where destinations can only be reached through transient addresses.  ... 
doi:10.1109/infcomw.2010.5466668 fatcat:pxtr4twx5rfxbg4lkdzooizrpy

Selective ablation of immature blood vessels in established human tumors follows vascular endothelial growth factor withdrawal

Laura E. Benjamin, Dragan Golijanin, Ahuva Itin, Dov Pode, Eli Keshet
1999 Journal of Clinical Investigation  
An important element in this regulation is that the acquisition of pericytes stabilizes the vasculature, preventing deleterious vessel regression due to transient fluctuations in tissue oxygen.  ...  treatment before prostatectomy (c, bright-field; e, dark-field).  ... 
doi:10.1172/jci5028 pmid:9916127 pmcid:PMC407882 fatcat:23q4lnezvzbdhl4p7kiptmiepa

Relational Models of Microarchitectures for Formal Security Analyses [article]

Nicholas Mosier, Hanna Lachnitt, Hamed Nemati, Caroline Trippel
2021 arXiv   pre-print
Using this vocabulary, we formalize microarchitectural leakage-focusing on leakage through hardware memory systems-so that it can be automatically detected in programs.  ...  First, we demonstrate that our leakage definition faithfully captures a sampling of (transient and non-transient) microarchitectural attacks from the literature.  ...  RELATED WORK Detecting Transient Leakage: Recent work simulates transient execution so that standard software analysis tools can detect classes of Spectre vulnerabilities in programs [17, 28, 30, 58,  ... 
arXiv:2112.10511v1 fatcat:ylcaex3mxfatrl2sezl5hl2iha
« Previous Showing results 1 — 15 out of 8,655 results