T Nigussie, JC Schabel, S Lipa… - … Transactions on Very …, 2022 - ieeexplore.ieee.org
We describe a design and fabrication experiment that has been performed to investigate a methodology for assessing the security of application specific integrated circuits (ASICs) …
SV Gupta - US Patent 11,409,870, 2022 - Google Patents
In example embodiments, systems and methods extract a model of a computer application during load time and store the model in memory. Embodiments may insert instructions into …
Edge-Cloud computing offloads parts of the computations that traditionally occurs in the cloud to edge nodes. The binary format WebAssembly is increasingly used to distribute and …
Hardware-software research routinely starts with modelling. High-level models can capture much of the desired system behaviour needed to begin evaluating architectural research …
B Olney, R Karam - ACM Journal on Emerging Technologies in …, 2022 - dl.acm.org
Adversarial machine learning is a prominent research area aimed towards exposing and mitigating security vulnerabilities in AI/ML algorithms and their implementations. Data …
Thanks to the emergence of package managers and online software repositories, modern software development heavily relies on the reuse of third-party libraries. This practice has …
AM Espinoza, R Wood, S Forrest… - 2022 52nd Annual IEEE …, 2022 - ieeexplore.ieee.org
Microservices are the dominant architecture used to build internet-scale applications today. Being internet-facing, their most critical attack surfaces are the OWASP top 10 Web …
S Zuo, J Zhuang, Y Liu, M Wang… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Instruction set randomization has been proposed for many years as a strategy against code injection. However, most of the methods are based entirely on software, which is vulnerable …