CONCEAL

作品数:4被引量:2H指数:1
导出分析报告
相关领域:电子电信更多>>
相关期刊:《Cybersecurity》《Current Zoology》更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-4
视图:
排序:
Malware Guard Extension:abusing Intel SGX to conceal cache attacks
《Cybersecurity》2020年第1期22-41,共20页Michael Schwarz Samuel Weiser Daniel Gruss Clementine Maurice Stefan Mangard 
This project has received funding from the European Research Council(ERC)under the European Union’s Horizon 2020 research and innovation programme(grant agreement No 681402);This work was partially supported by the TU Graz LEAD project“Dependable Internet of Things in Adverse Environments”.
In modern computer systems,user processes are isolated from each other by the operating system and the hardware.Additionally,in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants th...
关键词:Intel SGX Side channel Side-channel attack Prime+Probe 
Malware Guard Extension:abusing Intel SGX to conceal cache attacks
《Cybersecurity》2018年第1期1010-1029,共20页Michael Schwarz Samuel Weiser Daniel Gruss Clementine Maurice Stefan Mangard 
received funding from the European Research Council(ERC)under the European Union’s Horizon 2020 research and innovation programme(grant agreement No 681402);partially supported by the TU Graz LEAD project“Dependable Internet of Things in Adverse Environments”.
In modern computer systems,user processes are isolated from each other by the operating system and the hardware.Additionally,in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants th...
关键词:Intel SGX Side channel Side-channel attack Prime+Probe 
Does disruptive camouflage conceal edges and features?被引量:2
《Current Zoology》2015年第4期708-717,共10页Richard J. WEBSTER 
Camouflage is ubiquitous in the natural world and benefits both predators and prey. Amongst the range of conceal- ment strategies, disruptive coloration is thought to visually fragment an animal's' outline, thereby ...
关键词:ANTIPREDATOR Background matching Contour CRYPSIS CAMOUFLAGE Disruptive coloration Edge detection OBJECTRECOGNITION 
Enumeration of ConcealedNon-Kekul E an Helicenes With h=14
《新疆大学学报(自然科学版)》1997年第1期1-12,共12页Guo Xiaofeng Zhao Biao(Institute of Mathematics and Physics Department of Mathematics, Xinjiang University Urumqi, Xinjiang 830046 P.R.China) S.J.Cyvin J.Brunvoll and B.N.Cyvin (Department of Physical Chemistry The University of Trondheim N7034 Trondhe 
Helicenes are the simply connected helicenic (geometrically non-planar ) polyhexs. In this paper, we give a construction method for concealed non-Kekulean helicenes with h=14, and rigorously prove that there are exact...
关键词:IRREDUCIBLE VALLEY operations Sachs NATURE 
检索报告 对象比较 聚类工具 使用帮助 返回顶部