Cyber Security
3 Results were found on Technologies
Sub Category Name
INFERRING THE PERIODICITY OF DISCRETE SIGNALS
A method for testing a signal comprises obtaining a signal, determining whether the signal has at least one period, measuring that period and providing the measurement as output. A power spectral density estimation can be used for signals having a single period, and an autocorrelation function with slicing can be used in an iterative procedure […] Read More >
Compilation Integrity Assurance through Deep Code Alignment
TECHNOLOGY & POTENTIAL APPLICATIONWe propose a completely novel approach for detecting hardware Trojans. We obtain, from the foundry or by other means the binaries. These binaries are expected to largely match the programming code provided by the hardware designer with some unavoidable additions inserted in order to support debugging, QA, and to comply with manufacturing […] Read More >
A Software Only Anti-Spoofing Defense System for In-Car CAN Bus Networks
Modern cars have multiple dedicated computers under the hood called “electronic control units” (ECUs). These ECUs control many aspects of the car’s operation and are connected to each other in a network that typically uses the CAN bus protocol, which bus is a serial protocol with no security components. Replacing CAN bus with another technology […] Read More >