Articles with "security properties" as a keyword



Photo from wikipedia

FinalFilter: Asserting Security Properties of a Processor at Runtime

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Micro"

DOI: 10.1109/mm.2019.2921509

Abstract: & IN AN IDEAL world, it would be possible to build a provably correct and secure processor. However, the complexity of today’s processors puts this ideal out of reach. The complete verification of a modern… read more here.

Keywords: security properties; verification; asserting security; security ... See more keywords
Photo from wikipedia

Security Properties of Gait for Mobile Device Pairing

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2019.2897933

Abstract: Gait has been proposed as a feature for mobile device pairing across arbitrary positions on the human body. Results indicate that the correlation in gait-based features across different body locations is sufficient to establish secure… read more here.

Keywords: security properties; mobile device; gait based; device pairing ... See more keywords