Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Daniil M. Utin"'
Autor:
Narek Pezeshkian, John Yen, David A. Wilson, Joseph D. Neff, Rafael Suero, Daniil M. Utin, Hoa G. Nguyen, Benjamin Nahill, Brian Telle, Jacob Leemaster, Roger Khazan, Joseph Sobchuk
Publikováno v:
Unmanned Systems Technology XXI.
Under the Navy’s Flexible Cyber-Secure Radio (FlexCSR) program, the Naval Information Warfare Center Pacific and the Massachusetts Institute of Technology’s Lincoln Laboratory are jointly developing a unique cybersecurity solution for tactical un
Publikováno v:
NCA
This paper explains the process by which Intel Software Guard Extensions (SGX) can be leveraged into an existing codebase to protect a security-sensitive application. Intel SGX provides user-level applications with hardware-enforced confidentiality a
Publikováno v:
Information Security Journal: A Global Perspective. 17:164-169
It is becoming clear that the underground hacking industry as a whole (not just individual hackers) is continually gaining ground despite the best efforts of the information security industry. It seems the latter should have an overwhelming advantage
Autor:
Michael W. Geis, Michael Vai, Josh Kramer, Daniil M. Utin, Roger Khazan, Ben Nahill, David Whelihan
Publikováno v:
HPEC
Devices connected to the internet are increasingly the targets of deliberate and sophisticated attacks [1]. Embedded system engineers tend to focus on well-defined functional capabilities rather than “obscure” security and resilience. However,
Publikováno v:
ACM Conference on Computer and Communications Security
In this poster, we describe a one-size-fits-many Intellectual Property (IP) core which integrates advanced key management technology and streaming encryption into a single component to protect data in-transit.
Publikováno v:
MILCOM
The DoD vision of real-time information sharing and net-centric services available to warfighters at the tactical edge is challenged by low-bandwidth and high-latency tactical network links. Secured tactical applications require transmission of digit
Publikováno v:
MILCOM
This paper presents a usable graphical interface for specifying and automatically enacting access control rules for applications that involve dissemination of data among mobile tactical devices. A specific motivating example is unmanned aerial vehicl
Publikováno v:
NCA
Applications often re-transmit the same data, such as digital certificates, during repeated communication instances. Avoiding such superfluous transmissions with caching, while complicated, may be necessary in order to operate in low-bandwidth, high-