Sökning: "Timing attacks"

Visar resultat 1 - 5 av 13 uppsatser innehållade orden Timing attacks.

  1. 1. Ready? Fight! How Guilty Gear -Strive-‘s approach to fighting game animations lend themselves to character appeal.

    Kandidat-uppsats, Uppsala universitet/Institutionen för speldesign

    Författare :Fabian Larsson; Gustav Strömbom; [2023]
    Nyckelord :Analysis; animation; fighting game; frames; game feel; visual effects;

    Sammanfattning : This paper’s goal was to understand how the fighting game animations in the video game Guilty Gear -Strive- lent themselves to their characters appeal, by looking how the animations are built up to be a good quality for a more interesting character based on the character background. The paper aids to help designers find relevant information for the creation of animations for a greater player enjoyment of its characters in a fighting game. LÄS MER

  2. 2. Adversarial robustness of STDP-trained spiking neural networks

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Karl Lindblad; Axel Nilsson; [2023]
    Nyckelord :;

    Sammanfattning : Adversarial attacks on machine learning models are designed to elicit the wrong behavior from the model. One such attack on image classifiers are maliciously crafted inputs that, to the human eye, look untampered with but have been carefully altered to cause misclassification. LÄS MER

  3. 3. Determining the Optimal Frequencies for a Duplicated Randomized Clock SCA Countermeasure

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Gabriel Klasson Landin; Truls Julborg; [2023]
    Nyckelord :Side channel attack; Cryptography; Correlation power analysis; Chipwhisperer; Frequency; Hardware security;

    Sammanfattning : Side-channel attacks pose significant challenges to the security of embedded systems, often allowing attackers to circumvent encryption algorithms in minutes compared to the trillions of years required for brute-force attacks. To mitigate these vulnerabilities, various countermeasures have been developed. LÄS MER

  4. 4. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses

    Master-uppsats, Uppsala universitet/Institutionen för informationsteknologi

    Författare :Xiaoyue Chen; [2022]
    Nyckelord :;

    Sammanfattning : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. LÄS MER

  5. 5. The Effect of Distortions Induced by Adaptive Antenna Arrays in GNSS Applications

    Master-uppsats, Linköpings universitet/Kommunikationssystem; Linköpings universitet/Tekniska fakulteten

    Författare :Emma Beskow; [2022]
    Nyckelord :GNSS; GPS; Jamming; Beamforming; Adaptive antenna arrays; Frequency response distortions;

    Sammanfattning : Global Navigation Satellite Systems (GNSS) are vital tools for accurate navigation and timing for both civil and military use. Due to the low power of the GNSS signals, these systems are sensitive to interference attacks. For wideband GNSS jamming, adaptive antenna arrays are commonly used to suppress interference. LÄS MER