Essays about: "Timing attacks"
Showing result 1 - 5 of 13 essays containing the words Timing attacks.
-
1. Ready? Fight! How Guilty Gear -Strive-‘s approach to fighting game animations lend themselves to character appeal.
University essay from Uppsala universitet/Institutionen för speldesignAbstract : This paper’s goal was to understand how the fighting game animations in the video game Guilty Gear -Strive- lent themselves to their characters appeal, by looking how the animations are built up to be a good quality for a more interesting character based on the character background. The paper aids to help designers find relevant information for the creation of animations for a greater player enjoyment of its characters in a fighting game. READ MORE
-
2. Adversarial robustness of STDP-trained spiking neural networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Adversarial attacks on machine learning models are designed to elicit the wrong behavior from the model. One such attack on image classifiers are maliciously crafted inputs that, to the human eye, look untampered with but have been carefully altered to cause misclassification. READ MORE
-
3. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. READ MORE
-
4. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. READ MORE
-
5. The Effect of Distortions Induced by Adaptive Antenna Arrays in GNSS Applications
University essay from Linköpings universitet/Kommunikationssystem; Linköpings universitet/Tekniska fakultetenAbstract : Global Navigation Satellite Systems (GNSS) are vital tools for accurate navigation and timing for both civil and military use. Due to the low power of the GNSS signals, these systems are sensitive to interference attacks. For wideband GNSS jamming, adaptive antenna arrays are commonly used to suppress interference. READ MORE