Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Hirotaka Kokubo"'
Autor:
Yoshihiro Oyama, Hirotaka Kokubo
Publikováno v:
Journal of Computer Virology and Hacking Techniques.
Publikováno v:
CANDAR Workshops
Many studies have been conducted to detect malware based on machine learning of program features extracted using static analysis. In this study, we consider the task of distinguishing between malware and benign programs by learning their surface feat
Publikováno v:
Advances in Network-Based Information Systems ISBN: 9783319985299
NBiS
NBiS
Intel Software Guard Extensions (SGX) protects user software from malware by maintaining the confidentiality and integrity of the software executed in secure enclaves on random access memory. However, the confidentiality of its stored executable is n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a1906d2bf42a823cc2c95741bf710ca3
https://doi.org/10.1007/978-3-319-98530-5_63
https://doi.org/10.1007/978-3-319-98530-5_63
Publikováno v:
Denki Kako Gakkaishi. 42:5-11
Recently, amongst the various electrical discharge machining (EDM) processes, the number of micro-EDM applications has been increasing owing to the small reaction forces involved. However, the mechanism of material removal in a single discharge using
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783319083018
CARDIS
CARDIS
Embedded devices such as smart cards and smart phones are used for secure systems, for example automated banking machines and electronic money. The security of an embedded device depends strongly on secret information; cryptographic keys, nonces for
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8accbfe7dc60eac1cb6886680648053d
https://doi.org/10.1007/978-3-319-14123-7_1
https://doi.org/10.1007/978-3-319-14123-7_1
Publikováno v:
The Proceedings of The Manufacturing & Machine Tool Conference. :277-278
Publikováno v:
The Proceedings of The Manufacturing & Machine Tool Conference. :129-130
Autor:
Hirotaka Kokubo, Kouichi Itoh, Dai Yamamoto, Tsutomu Matsumoto, Masahiko Takenaka, Naoya Torii
Publikováno v:
EURASIP Journal on Information Security. 2016(1)
A true random number generator (TRNG) is proposed and evaluated by field-programmable gate arrays (FPGA) implementation that generates random numbers by exclusive-ORing (XORing) the outputs of many SR latches (Hata and Ichikawa, IEICE Trans. Inf. Sys