Zobrazeno 1 - 10
of 68
pro vyhledávání: '"DONGHYUN KWON"'
Publikováno v:
IEEE Access, Vol 12, Pp 56110-56119 (2024)
A smart contract is a program executed on a blockchain. However, once the smart contract is deployed on the blockchain, it becomes visible to all participants and remains immutable. Thus, any sensitive information or vulnerabilities in smart contract
Externí odkaz:
https://doaj.org/article/43b53a1d0951445995449d87afd6a898
Publikováno v:
IEEE Access, Vol 12, Pp 5462-5476 (2024)
Preventing Use-After-Free (UAF) bugs is crucial to ensure temporal memory safety. Against UAF attacks, much research has adopted a well-known approach, lock-and-key, in which unique, disposable locks and keys are first assigned respectively to object
Externí odkaz:
https://doaj.org/article/da8da3be40344961baad91a9e86733e0
Publikováno v:
IEEE Access, Vol 11, Pp 124887-124898 (2023)
WebAssembly (Wasm), a technology enabling efficient native code execution in web browsers, has seen a significant rise in adoption as a popular compilation target. This has led to the emergence of lightweight web services powered by Wasm, characteriz
Externí odkaz:
https://doaj.org/article/125e5d6e7780464a80b2c12f20389808
Publikováno v:
IEEE Access, Vol 10, Pp 132675-132684 (2022)
Embedded systems are deployed in many fields, from industrial applications to personal products. However, there are growing concerns regarding the security of these embedded systems as the number of attacks targeting them has increased. Control flow
Externí odkaz:
https://doaj.org/article/065360bcd1714e999cb31afe55dc3109
Publikováno v:
Sensors, Vol 23, Iss 7, p 3568 (2023)
Memory isolation is an essential technology for safeguarding the resources of lightweight embedded systems. This technique isolates system resources by constraining the scope of the processor’s accessible memory into distinct units known as domains
Externí odkaz:
https://doaj.org/article/a3f64379289d4477b07ae94b650f6289
Publikováno v:
Journal of Institute of Control, Robotics and Systems. 29:113-119
Publikováno v:
Sensors, Vol 22, Iss 4, p 1392 (2022)
In recent decades, there has been an increasing number of studies on control flow integrity (CFI), particularly those implementing hardware-assisted CFI solutions that utilize a special instruction set extension. More recently, ARM and Intel, which a
Externí odkaz:
https://doaj.org/article/41eded0faa5e4fccab4671439929c1e7
Publikováno v:
Water, Vol 13, Iss 24, p 3488 (2021)
Twenty-three rainfall events were monitored to determine the characteristics of the stormwater runoff entering a rain garden facility and evaluate its performance in terms of pollutant removal and volume reduction. Data gathered during the five-year
Externí odkaz:
https://doaj.org/article/94f7fa71d98148c785643d311d76a539
Publikováno v:
Sensors, Vol 21, Iss 22, p 7771 (2021)
Commodity processor architectures are releasing various instruction set extensions to support security solutions for the efficient mitigation of memory vulnerabilities. Among them, tagged memory extension (TME), such as ARM MTE and SPARC ADI, can pre
Externí odkaz:
https://doaj.org/article/ccd982a022c645d29e8a8bf1600fa765
Autor:
Jiwon Seo, Inyoung Bang, Yungi Cho, Jangseop Shin, Dongil Hwang, Donghyun Kwon, Yeongpil Cho, Yunheung Paek
Publikováno v:
The Journal of Supercomputing. 79:1032-1064