Magview++: Data exfiltration via cpu magnetic signals under video decoding

X Ji, J Zhang, S Zou, Y Chen, G Qu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… by assigning a timestamp to each video frame. We find out that changing the timestamp of
a … implementation, we believe it can be extended by a dedicated device with more sensitive …

[PS][PS] Levo: A Resource-Flow Computer

AK Uht, D Morano, A Khala, M de Alba, S Langford… - ece.neu.edu
… window can have any timestamp value; 32-bits or more are required for the timestamp. …
More recently, Wood et al. 28] describe a timestamp snooping mechanism used to provide a total …

Widir: A wireless-enabled directory cache coherence protocol

A Franques, A Kokolis, S Abadal… - … Symposium on High …, 2021 - ieeexplore.ieee.org
Snooping protocols [4], [34] also use a totally-ordered interconnect. Several works extend
snooping … 67] or at the network level using global timestamps [66], snoop-order numbers [69], a …

Snooping Coherence Protocols

V Nagarajan, DJ Sorin, MD Hill, DA Wood - A Primer on Memory …, 2020 - Springer
In this chapter, we present snooping coherence protocols. Snooping protocols were the first
widely deployed class of protocols and they continue to be used in a variety of systems. …

An efficient authenticated elliptic curve cryptography scheme for multicore wireless sensor networks

ET Oladipupo, OC Abikoye, AL Imoize… - IEEE …, 2023 - ieeexplore.ieee.org
… Prime among the methods for extending the life span of … Because the delivered message
contains a timestamp T that … be found in nList, the timestamp T will invalidate the message, and …

Air-gap electromagnetic covert channel

M Guri - IEEE Transactions on Dependable and Secure …, 2023 - ieeexplore.ieee.org
… This work is an extended version of a paper accepted to a … A switch-mode power supply
(SMPS) is the component that … value of the TSC (Timestamp Counter register) at nanosecond …

Faults in smart grid systems: Monitoring, detection and classification

AEL Rivas, T Abrao - Electric Power Systems Research, 2020 - Elsevier
… The internal clock generates the timestamp for sensor data and synchronizes with the external
… This SMPS consists of three main parts namely PMU, PDC, and Communication system. …

[图书][B] Performance analysis and optimizations of managed applications on Non-Uniform Memory architectures

O Papadakis - 2022 - search.proquest.com
SMPs are under the spotlight during the last decades due to … snoops for local cache reads),
the MESIF [GH09] (extends … , the MOESI [AMD20] (extends MESI with the Owned state to …

A Secure and Efficient Group Key Management Scheme for Clusters of String Inverters

M Basile, G Dini, F Vernia, L Lamoglie - Applied Sciences, 2020 - mdpi.com
… An attacker that succeeds in eavesdropping the data traffic … The protocol is based and extends
a key management … Upon receiving the ‹Join, JS› message, the KDC reads a timestamp τ …

Using Social Networks for Law Enforcement. The Hellenic Paradigm.

C Antonoudis - 2021 - repository.ihu.edu.gr
… What the authors try to explain is that SMPs were created to fill the gap between public forums
and private conversations. Before their existence, there were many websites that provided …