Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Jan Nordholz"'
Publikováno v:
Measurement: Sensors, Vol 18, Iss , Pp 100208- (2021)
Based on the existing specifications for digital calibration certificates (DCCs), this work presents two approaches to using DCCs in a fully digitised workflow. It shows the basic methods needed to access, edit and deposit DCCs in either a web reposi
Externí odkaz:
https://doaj.org/article/e59e6ec023c349ed9c55e99be6a7425e
Autor:
Jan Nordholz
Publikováno v:
EuroSys
Hypervisor implementations such as XMHF, Nova, PROSPER, prplHypervisor, the various L4 descendants, as well as KVM and Xen offer mechanisms for dynamic startup and reconfiguration, including the allocation, delegation and destruction of objects and r
Publikováno v:
CLOSER
Publikováno v:
Measurement: Sensors, Vol 18, Iss, Pp 100208-(2021)
Based on the existing specifications for digital calibration certificates (DCCs), this work presents two approaches to using DCCs in a fully digitised workflow. It shows the basic methods needed to access, edit and deposit DCCs in either a web reposi
Publikováno v:
CODASPY
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy-CODASPY 17
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy-CODASPY '17
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy-CODASPY 17
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy-CODASPY '17
Adversaries with physical access to a target platform can perform cold boot or DMA attacks to extract sensitive data from the RAM. In response, several main-memory encryption schemes have been proposed to prevent such attacks. Also hardware vendors h
Publikováno v:
Information and Communications Security ISBN: 9783319500102
ICICS
ICICS
The virtualization capabilities of today’s systems offer rootkits excellent hideouts, where they are fairly immune to countermeasures. In this paper, we evaluate the vulnerability to hypervisor-based rootkits of ARM-based platforms, considering bot
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4b4ed8722fe1de8ffe5ca34bf8c80da5
https://doi.org/10.1007/978-3-319-50011-9_29
https://doi.org/10.1007/978-3-319-50011-9_29
Publikováno v:
TrustED@CCS
As virtually all smartphones today run general purpose operating systems, they have to consider malware attacks, with rootkits being among the most hideous ones. Since rootkits execute with the same privileges as the OS kernel, traditional countermea
Autor:
Jan Nordholz, Julian Vetter, Janis Danisevskis, Michael Peter, Matthias Petschick, Jean-Pierre Seifert
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9783319226347
ISCIS
ISCIS
System designers have come to recognize the merits of building critical systems on top of small kernels for their ability to provide strong isolation at system level. This is due to the fact that enforceable isolation is the prerequisite for any reas
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b5dc076f38dd31b40bdcf3643e1a50d3
https://doi.org/10.1007/978-3-319-22635-4_13
https://doi.org/10.1007/978-3-319-22635-4_13
Publikováno v:
Information Security and Cryptology-ICISC 2015 ISBN: 9783319308395
ICISC
ICISC
Cell phones have evolved into general purpose computing devices, which are tightly integrated into many IT infrastructures. As such, they provide a potential malware entry point that cannot be easily dismissed if attacks by determined adversaries are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6509ab9fcb7b91722e9c4fd706a6b731
Publikováno v:
Trust and Trustworthy Computing ISBN: 9783642389078
TRUST
TRUST
Traditional network authentication systems like Windows’ Active Directory or MIT’s Kerberos only provide for mutual authentication of communicating entities, e.g. a user’s email client interacting with an IMAP server, while the user’s machine
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::56ce6a1a722f9c9f32a362c83859ed8c
https://doi.org/10.1007/978-3-642-38908-5_3
https://doi.org/10.1007/978-3-642-38908-5_3