• Aucun résultat trouvé

[PDF] Top 20 Information Leakage by Trace Analysis in QUAIL

Has 10000 "Information Leakage by Trace Analysis in QUAIL" found on our website. Below are the top 20 most common "Information Leakage by Trace Analysis in QUAIL".

Information Leakage by Trace Analysis in QUAIL

Information Leakage by Trace Analysis in QUAIL

... of leakage via trace analysis would follow a different path, as explained in Algorithm 3 ...same trace twice. In that case, the resulting final state should be added only once to ... Voir le document complet

18

UP & DOWN: Improving Provenance Precision by Combining Workflow- and Trace-Level Information

UP & DOWN: Improving Provenance Precision by Combining Workflow- and Trace-Level Information

... dependencies. In 2 , we analyze the prove- nance graph structure and infer further dependencies by computing the transitive closure of data ...either by (i) collecting ac- tual workflow execution ... Voir le document complet

6

Leakage Assessment through Neural Estimation of the Mutual Information

Leakage Assessment through Neural Estimation of the Mutual Information

... poorly in this situation, we hypothesized that the information in the first layer, espe- cially the value of s, could be too condensed in the sense that only one neuron is used to describe ... Voir le document complet

19

Best information is most successful: Mutual information and success rate in side-channel analysis

Best information is most successful: Mutual information and success rate in side-channel analysis

... the leakage measurements, pre-processed to be represented as probability density (or mass) ...inaccurate in practical situations, in particular because the model must be non-injective for MIA to be ... Voir le document complet

32

Efficient methods for trace analysis parallelization

Efficient methods for trace analysis parallelization

... Parallel trace analysis A major problem with the parallel analysis of kernel traces comes from the strong sequential dependencies within the trace ...requires information contained ... Voir le document complet

13

Quantifying Leakage in the Presence of Unreliable Sources of Information

Quantifying Leakage in the Presence of Unreliable Sources of Information

... model information leakage in the typical scenario of protocol attacks, where the adversary has only a limited number of tries to guess the value of the secret ...[23]. In such a sce- nario, ... Voir le document complet

51

Tracking magma dynamics by laser ablation (LA)-ICPMS trace element analysis of glass in volcanic ash: The 1995 activity of Mt. Etna

Tracking magma dynamics by laser ablation (LA)-ICPMS trace element analysis of glass in volcanic ash: The 1995 activity of Mt. Etna

... isotopes) in solid volcanic products during eruptions provides a means to track magma dynamics and, in open-conduit volcanoes, may aid in forecasting of paroxysmal ...determined by bulk ... Voir le document complet

4

Output-sensitive Information flow analysis

Output-sensitive Information flow analysis

... new information flow property, called output-sensitive ...noninterference. Information-flow security prevents confidential information to be leaked to pub- lic ...some information, this ... Voir le document complet

18

Quantifying Information Leakage of Randomized Protocols

Quantifying Information Leakage of Randomized Protocols

... value. In this step we also add automatically a free command to signal when a variable is not used anymore and can be ...Execution. QUAIL symbolically executes the preprocessed code and builds an annotated ... Voir le document complet

43

Markovian Processes for Quantitative Information Leakage

Markovian Processes for Quantitative Information Leakage

... Execution QUAIL symbolically executes the prepro- cessed code and builds an annotated Markov chain semantics of the program execution, as explained in Chapter 4 ...prior information of the attacker ... Voir le document complet

155

QUAIL: A Quantitative Security Analyzer for Imperative Code

QUAIL: A Quantitative Security Analyzer for Imperative Code

... Quantitative analysis can be used to decide which of two alternative protocols is more ...useful, in the qualitative sense, such as a password authentication protocol, for which there is always a positive ... Voir le document complet

15

Comparative Analysis of Leakage Tools on Scalable Case Studies

Comparative Analysis of Leakage Tools on Scalable Case Studies

... examples. In this paper we use analyze two scalable, real life privacy case studies: the privacy of the energy consumption data of the users of a smart grid network and the secrecy of the voters’ voting ... Voir le document complet

37

Glyceryl trinitrate metabolism in the quail embryo by the glutathione S-transferases leads to a perturbation in redox status and embryotoxicity

Glyceryl trinitrate metabolism in the quail embryo by the glutathione S-transferases leads to a perturbation in redox status and embryotoxicity

... enzyme in the synthesis of GSH, results in the development of embryos with multiple developmental defects (Hales and Brown, 1991; Shi et ...to in ovo GTN treated. Pre-treatment with NAC, a precursor ... Voir le document complet

38

Quantitative trace analysis by combined chromatography and mass spectrometry using external and internal standards

Quantitative trace analysis by combined chromatography and mass spectrometry using external and internal standards

... L’accès à ce site Web et l’utilisation de son contenu sont assujettis aux conditions présentées dans le site LISEZ CES CONDITIONS ATTENTIVEMENT AVANT D’UTILISER CE SITE WEB. NRC Publicat[r] ... Voir le document complet

74

Analysis of crystallographic texture information by the hyperspherical harmonic expansion

Analysis of crystallographic texture information by the hyperspherical harmonic expansion

... Our system consists of a two-dimensional polycrystal, in which the orientation of each grain is fully specified by a single rotation in the plane, through an angle c[r] ... Voir le document complet

230

Inter-laboratory comparison for trace analysis: EQRAIN traces proficiency  testing organized by CETAMA

Inter-laboratory comparison for trace analysis: EQRAIN traces proficiency testing organized by CETAMA

... proficiency in testing for elements at a level described as "trace", which are representative of those found in nuclear ...methods in terms of repeatability and reproducibility, for ... Voir le document complet

13

Air leakage in buildings

Air leakage in buildings

... much in excess of the infiltration that will otherwise occur, unless the various floors can be effectively isolated from one ...merit in most Canadian ...buildings. In general, humidified buildings ... Voir le document complet

6

Wavelet Analysis of a Blade Tip-Leakage Flow

Wavelet Analysis of a Blade Tip-Leakage Flow

... These results indicate the event observed on probe 46, associated with the spectrum hump around 1.3 kHz, corresponds to an unsteady tip separation.. The corresponding Strouhal number, ca[r] ... Voir le document complet

6

TRAP: trace runtime analysis of properties

TRAP: trace runtime analysis of properties

... raw trace as a huge file, using no filtering, but the library can be reused to transform that huge file into as many clock mappings as ...compiler. In STML example on ...mapped in order to analyze ... Voir le document complet

16

Improving Trace Generation and Analysis for Medical Devices

Improving Trace Generation and Analysis for Medical Devices

... caregivers in the same way Flight Management Systems help a pilot flying ...revisions by two ...hindered by the current software verification practices of the MD ...decades in the most ... Voir le document complet

4

Show all 10000 documents...