Microarchitectural attacks threaten system security and privacy, especially if they can be mounted without native code execution. Recent re...
This paper introduces a significant new vector for microarchitectural attacks, expanding the landscape of "scriptless" side-channel vulnerabilities. B...
Detecting malicious software or hardware behavior during the operation of a computer system requires observables from one or more abstracti...
The submission, titled "Poster: A microarchitectural signals analysis platform to craft Hardware Security Counters," addresses a critical challenge in...
This poster proposes to address the critical challenge of "Isolating PIM from OS Level Adversaries," a topic of high relevance in contemporary system...
This talk overviews our recent work on TLBlur, a novel approach that leverages compiler instrumentation and the recent AEX-Notify hardware...
This talk outlines "TLBlur," a promising new approach to mitigating controlled-channel attacks against Intel SGX enclaves. The work leverages a novel...
Este artigo apresenta uma proposta teórico-conceitual para investigar metodologias criativas e epistemologias sonoras de culturas de música eletrônica...
This article, "MACETAMENTO NO BEAT PEGA HACKER," introduces a compelling theoretical-conceptual framework aimed at investigating the creative methodol...
This paper develops a secured enterprise network terminal security solution that seeks to safeguard the confidentiality, integrity, and availability o...
This paper, "Design Of an Enterprise Network Terminal Security Solution," addresses a highly pertinent and critical issue in contemporary network secu...
Amidst the rapid development of technology, website vulnerabilities are a major threat, opening up opportunities for hackers to hunt and st...
This paper addresses a highly relevant and critical topic: the security posture of the UNIPDU Jombang campus website. By employing a Vulnerability Ass...
Salah satu langkah preventif untuk meminimalisir dampak buruk serangan siber adalah dengan melakukan penilaian kerentanan yang hasilnya dapat dianalis...
This paper, titled "Vulnerability Analysis of FMIPA UNSRAT Website Based on Open Web Application Security Project Top 10 Framework," addresses a highl...
Steganografi merupakan teknik untuk menyembunyikan pesan rahasia dalam media digital guna menjaga kerahasiaan informasi. Penelitian ini menerapkan met...
This paper presents a focused investigation into the application of the Least Significant Bit (LSB) method for embedding secret messages within graysc...
Il contributo discute le principali questioni di ciberiscurezza dei sistemi di Intelligenza Artificiale (IA) in una prospettiva informatico-giuridica....
The article, "Intelligenza artificiale e cibersicurezza: profili informatico-giuridici, fra vulnerabilità delle macchine e delle persone," addresses a...
Showing 11 to 20 of 23 results
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria