The outbreak of Covid-19 pandemic has caused millions of people infected and dead, resulting in global economy depression. Lessons learned to minimize the damage in an emerging pandemic is that timely tracking and rea...
详细信息
Code comment generation aims at generating natural language descriptions for a code snippet to facilitate developers’ program comprehension activities. Despite being studied for a long time, a bottleneck for existing...
详细信息
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid...
详细信息
Recent years have witnessed the deployment of code language models (LMs) in various code intelligence tasks such as code completion. Yet, it is challenging for pre-trained LMs to generate correct completions in privat...
详细信息
software defect prediction is a popular research direction in software engineering. To address the issue of low prediction accuracy in existing methods, in this paper we propose a software defect prediction model base...
详细信息
Nowadays, the Online Judge system has been an increasingly important tool for promoting users' algorithm skills. However, the questions of Online Judge systems are usually described with much redundant information...
详细信息
Accurate diagnosis of brain tumors from MRI images is vital for effective treatment planning and improved patient outcomes. However, the manual interpretation of MRI scans remains challenging due to tumor heterogeneit...
详细信息
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical *** recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different m...
详细信息
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical *** recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical ***,some problems in the information transfer process between wireless medical devices and mobile medical apps,such as information leakage and privacy *** paper first designs a cross-device key agreement model for blockchain-enabled *** model can establish a key agreement mechanism for secure medical data ***,a certificateless authenticated key agreement(KA)protocol has been proposed to strengthen the information transfer security in the cross-device key agreement *** proposed KA protocol only requires one exchange of messages between the two parties,which can improve the protocol execution ***,any unauthorized tampering of the transmitted signed message sent by the sender can be detected by the receiver,so this can guarantee the success of the establishment of a session key between the strange *** blockchain ledger can ensure that the medical data cannot be tampered with,and the certificateless mechanism can weaken the key escrow ***,the security proof and performance analysis are given,which show that the proposed model and KA protocol are more secure and efficient than other schemes in similar literature.
Trusted execution environment (TEE) promises strong security guarantee with hardware extensions for security-sensitive tasks. Due to its numerous benefits, TEE has gained widespread adoption, and extended from CPU-onl...
详细信息
ISBN:
(纸本)9798350326598;9798350326581
Trusted execution environment (TEE) promises strong security guarantee with hardware extensions for security-sensitive tasks. Due to its numerous benefits, TEE has gained widespread adoption, and extended from CPU-only TEEs to FPGA and GPU TEE systems. However, existing TEE systems exhibit inadequate and inefficient support for an emerging (and significant) processing unit, NPU. For instance, commercial TEE systems resort to coarse-grained and static protection approaches for NPUs, resulting in notable performance degradation (10%-20%), limited (or no) multitasking capabilities, and suboptimal resource utilization. In this paper, we present a secure NPU architecture, known as sNPU, which aims to mitigate vulnerabilities inherent to the design of NPU architectures. First, sNPU proposes NPU Guarder to enhance the NPU's access control. Second, sNPU defines new attack surfaces leveraging in-NPU structures like scratchpad and NoC, and designs NPU Isolator to guarantee the isolation of scratchpad and NoC routing. Third, our system introduces a trusted software module called NPU Monitor to minimize the software TCB. Our prototype, evaluated on FPGA, demonstrates that sNPU significantly mitigates the runtime costs associated with security checking (from upto 20% to 0%) while incurring less than 1% resource costs.
Millimeter wave radar is gaining traction recently as a promising modality for enabling pervasive and privacy-preserving gesture recognition. However, the lack of rich and fine-grained radar datasets hinders progress ...
详细信息
暂无评论