Attackers can exploit vulnerabilities in web applications to commit malicious acts such as corrupting application functionality and Trojan horse implantation. For injection vulnerabilities in Web applications, existin...
详细信息
Dynamic random access memory(DRAM) is facing the challenge of technology scaling. The decreasing feature size makes it harder to make DRAM cells which can keep the current data-holding time. When DRAM cells cannot hol...
详细信息
Dynamic random access memory(DRAM) is facing the challenge of technology scaling. The decreasing feature size makes it harder to make DRAM cells which can keep the current data-holding time. When DRAM cells cannot hold data for a long time, DRAM chips need a more frequent refreshing operation. Therefore, in the near future, time and energy cost on DRAM refreshing will be no longer trivial. In this paper, we propose DRAM Error Correction Pointer(ECP), an error-correction-manner framework, to reduce DRAM refreshes without data loss. We exploit the non-uniform feature of DRAM cells with respect to the data retention time. Compared with the conventional refreshing mechanisms, which refresh DRAM chips by the retention time of the leakiest cells, we refresh the chips much fewer times, and treat the not-in-time refreshed cells as fault elements. We use the structure of ECP as a fault tolerant element. By recording the data which are supposed to be written into the leaky cells in our DRAM-ECP structures, DRAM-ECP can significantly decrease refreshing frequency. When these data are to be read out, DRAM-ECP retrieves the data stored in ECPs and covers them to the corresponding position in the data row. Our experiments show that DRAM-ECP can reduce over 70%refreshing operations than the current refreshing mechanism and also get significant energy saving.
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2;based on the following two properties of disturbance *** property is the weight correlation between the first 1...
详细信息
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2;based on the following two properties of disturbance *** property is the weight correlation between the first 16-step disturbance vectors and the60-step disturbance *** other property requires all the differences of the active bit positions of the first 16-step disturbance vectors to be
Current network assessment models often ignore the impact of attack-defense timing on network security, making it difficult to characterize the dynamic game of attack-defense effectively. To effectively manage the net...
详细信息
At present, APT attack detection mainly focuses on the specific realization of detection technology, and there is little research on the timing strategy for active detection of APT attack. This paper focuses on the pr...
详细信息
Vulnerable code reuse in open source software is a serious threat to software ***,the existing highefficiency methods for vulnerable code clone detection have a large number of false-nega
ISBN:
(纸本)9781509053643;9781509053636
Vulnerable code reuse in open source software is a serious threat to software ***,the existing highefficiency methods for vulnerable code clone detection have a large number of false-nega
With the development of attack technology, identifying the real intention of network attack and avoiding further deterioration of security situation has become a hot research topic in recent years. This paper proposes...
详细信息
We present a systematic investigation of the in-plane anomalous Hall effect (IPAHE) induced by the in-plane magnetization in single-crystalline Fe(211) films epitaxially grown on MgO(110) substrates. A single-crystal ...
详细信息
We present a systematic investigation of the in-plane anomalous Hall effect (IPAHE) induced by the in-plane magnetization in single-crystalline Fe(211) films epitaxially grown on MgO(110) substrates. A single-crystal domain in the Fe(211) films is well controlled using slightly miscut substrates, enabling precise observation of the IPAHE. A pronounced IPAHE is observed when the magnetization aligns along the Fe[1¯11] direction, with the in-plane anomalous Hall resistivity ρIPAH reaching its maximum value and showing independence from the current direction. This behavior aligns with phenomenological models dictated by crystalline symmetry and likely stems from epitaxial strain in the films. The scaling relationship between ρIPAH and the longitudinal resistivity across a range of temperatures and film thicknesses is systematically analyzed. A nonmonotonic temperature dependence of ρIPAH indicates a complex interplay between extrinsic and intrinsic mechanisms. Our study provides experimental insight into the mechanisms underlying IPAHE and highlights the potential for tailoring IPAHE through film thickness and strain engineering.
With the development of the nonvolatile memory(NVM),using NVM in the design of the cache and scratchpad memory(SPM)has been *** paper presents a data variable allocation(DVA)algorithm based on the genetic algorithm fo...
详细信息
With the development of the nonvolatile memory(NVM),using NVM in the design of the cache and scratchpad memory(SPM)has been *** paper presents a data variable allocation(DVA)algorithm based on the genetic algorithm for NVM-based SPM to prolong the *** lifetime can be formulated indirectly as the write counts on each SPM *** the differences between global variables and stack variables,our optimization model has three *** constraints of the central processing unit(CPU)utilization and size are used for all variables,while no-overlay constraint is only used for stack *** satisfy the constraints of the optimization model,we use the greedy strategy to generate the initial population which can determine whether data variables are allocated to SPM and distribute them evenly on SPM ***,we use the Mälardalen worst case executive time(WCET)benchmark to evaluate our *** experimental results show that the DVA algorithm can not only obtain close-to-optimal solutions,but also prolong the lifetime by 9.17% on average compared with SRAM-based SPM.
with the growth of network scale, present researches on the attack path discovery often encounter the problem of search space explosion that results in fails. To tackle the problem of attack path discovery for large-s...
详细信息
暂无评论