To see the other types of publications on this topic, follow the link: Memory security.

Journal articles on the topic 'Memory security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Memory security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Apryshchenko, V. Yu. "Memory as Security." New Past, no. 3 (2016): 86–108. http://dx.doi.org/10.18522/2500-3224-2016-3-86-108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sha, Mo, Yifan Cai, Sheng Wang, Linh Thi Xuan Phan, Feifei Li, and Kian-Lee Tan. "Object-oriented Unified Encrypted Memory Management for Heterogeneous Memory Architectures." Proceedings of the ACM on Management of Data 2, no. 3 (2024): 1–29. http://dx.doi.org/10.1145/3654958.

Full text
Abstract:
In contemporary database applications, the demand for memory resources is intensively high. To enhance adaptability to varying resource needs and improve cost efficiency, the integration of diverse storage technologies within heterogeneous memory architectures emerges as a promising solution. Despite the potential advantages, there exists a significant gap in research related to the security of data within these complex systems. This paper endeavors to fill this void by exploring the intricacies and challenges of ensuring data security in object-oriented heterogeneous memory systems. We introduce the concept of Unified Encrypted Memory (UEM) management, a novel approach that provides unified object references essential for data management platforms, while simultaneously concealing the complexities of physical scheduling from developers. At the heart of UEM lies the seamless and efficient integration of data encryption techniques, which are designed to ensure data integrity and guarantee the freshness of data upon access. Our research meticulously examines the security deficiencies present in existing heterogeneous memory system designs. By advancing centralized security enforcement strategies, we aim to achieve efficient object-centric data protection. Through extensive evaluations conducted across a variety of memory configurations and tasks, our findings highlight the effectiveness of UEM. The security features of UEM introduce low and acceptable overheads, and UEM outperforms conventional security measures in terms of speed and space efficiency.
APA, Harvard, Vancouver, ISO, and other styles
3

Lescisin, Michael, and Qusay H. Mahmoud. "Evaluation of Dynamic Analysis Tools for Software Security." International Journal of Systems and Software Security and Protection 9, no. 3 (2018): 34–59. http://dx.doi.org/10.4018/ijsssp.2018070102.

Full text
Abstract:
This article discusses the development of secure software by means of dynamic analysis tools. A secure software-based system should have security checks and balances integrated throughout its entire development lifecycle, including its deployment phase. Therefore, this article covers both using software security tools for testing code in development as well as monitoring code in deployment to ensure that it is operating securely. The security issues discussed in this article will be split into two categories – memory safety issues and input validation issues. Memory safety issues concern problems of unauthorized memory access such as buffer overflows, stack overflows, use-after-free, double-free, memory leaks, etc. Although not strictly a memory safety issue, concurrency issues, such as data races, will be considered as memory safety issues in this article. Input validation issues concern problems where untrusted input is directly passed to handlers which are designed to handle both data and commands. Examples of this include path traversal, SQL injection, command injection, JavaScript/HTML injection, etc. As a result of this significant difference between these two types of security vulnerabilities, two sets of tools are evaluated with one set focusing on memory safety issues and the other on input validation issues. This article explores the benefits and limitations of current software dynamic analysis tools by evaluating them against both the authors test cases as well as the OWASP Benchmark for Security Automation and proposes solutions for implementing secure software applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Yuliana, Mike, Nuril Hidayah, and Amang Sudarsono. "Implementation of Web-Based File Sharing Security System." MOTIVECTION : Journal of Mechanical, Electrical and Industrial Engineering 6, no. 1 (2024): 41–52. http://dx.doi.org/10.46574/motivection.v6i1.314.

Full text
Abstract:
File-sharing activities become a bridge for communication in the form of data between one party and another party. File sharing allows users to share data with other users, by uploading data to the server computer and other users can download data from the server computer. A document security system is indispensable to keep document data safe until its destination. File Web Sharing will transmit data with cryptographic methodologies. The algorithm used is Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish. This study aims to compare the performance of AES, DES, and Blowfish algorithms when implemented to secure file sharing. Performance research results show that the DES algorithm is on average 8.35% faster than AES and the Blowfish algorithm is 7.11% faster than AES. Memory usage capacity testing shows that the AES algorithm requires 4.82% greater memory capacity than Blowfish, and the DES requires 2.41% greater memory capacity than the Blowfish algorithm. Kegiatan file sharing menjadi jembatan komunikasi data antara satu pihak dengan pihak lainnya. File sharing memberikan pengguna kemampuan untuk berbagi data dengan pengguna lain, dengan cara mengunggah data ke komputer server dan pengguna lain dapat mengunduh data dari komputer server. Sistem keamanan terhadap dokumen sangat diperlukan untuk menjaga data dokumen tetap aman sampai tujuannya. Web File Sharing akan mengirimkan data dengan metodologi kriptografi. Algoritma yang digunakan adalah Advanced Encryption Standard (AES), Data Encryption Standard (DES), dan Blowfish. Penelitian ini bertujuan untuk membandingkan kinerja algoritma AES, DES dan Blowfish saat diimplementasikan untuk mengamankan file sharing. Hasil pengujian kinerja menunjukkan bahwa algoritma DES rata-rata 8,35% lebih cepat dibandingkan AES sedangkan Blowfish 7,11% lebih cepat dibandingkan AES. Berdasarkan pengujian kapasitas penggunaan memori terlihat bahwa AES membutuhkan kapasitas memori 4,82% lebih besar dibandingkan Blowfish dan DES membutuhkan kapasitas memori 2,41% lebih besar dari Blowfish.
APA, Harvard, Vancouver, ISO, and other styles
5

Younan, Yves, Wouter Joosen, Frank Piessens, and Hans Van den Eynden. "Improving Memory Management Security for C and C++." International Journal of Secure Software Engineering 1, no. 2 (2010): 57–82. http://dx.doi.org/10.4018/jsse.2010040104.

Full text
Abstract:
Memory managers are an important part of modern language and are used to dynamically allocate memory. Many managers exist; however, two major types can be identified: manual memory allocators and garbage collectors. In the case of manual memory allocators, the programmer must manually release memory back to the system when it is no longer needed. Problems can occur when a programmer forgets to release it, releases it twice or uses freed memory. These problems are solved in garbage collectors. However, both manual memory allocators and garbage collectors store management information. This paper describes several vulnerabilities for C and C++ and how these could be remedied by modifying the management information of a representative manual memory allocator and garbage collector. Additionally, the authors present an approach that, when applied to memory managers, will protect against these attack vectors.
APA, Harvard, Vancouver, ISO, and other styles
6

Crenne, Jérémie, Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet, Russell Tessier, and Deepak Unnikrishnan. "Configurable memory security in embedded systems." ACM Transactions on Embedded Computing Systems 12, no. 3 (2013): 1–23. http://dx.doi.org/10.1145/2442116.2442121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gustafsson, Karl, and Maria Mälksoo. "Memory-Political Deterrence: Shielding Collective Memory and Ontological Security through Dissuasion." International Studies Quarterly 68, no. 1 (2024): 1–12. https://doi.org/10.1093/isq/sqae006.

Full text
Abstract:
Traditionally used within the context of hard military power in interstate relations, the concept of deterrence has been progressively extended to non-state actors and new issue areas. While scholarship on the social aspects of deterrence has expanded our understanding of this core international security practice, the focus of existing research has largely remained on physical security. This article argues that there is a phenomenon in international politics that can be called memory-political deterrence. Memory-political deterrence refers to the ways in which states seek to dissuade other political actors from taking actions that threaten the collective memory narratives that underpin the ontological security of the deterring actor. Memory-political deterrence works, for example, through political rhetoric, declarations, diplomatic insults, commemorative practices, and punitive memory laws. We illustrate the article’s arguments through empirical examples from Russia’s and China’s recent memory-political deterrence efforts toward Ukraine and Japan, respectively. In doing so, we elucidate the ways in which memory politics is intertwined with geopolitics, underpinning wider world-ordering aspirations.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Jinjae, Derry Pratama, Minjae Kim, Howon Kim, and Donghyun Kwon. "CoMeT: Configurable Tagged Memory Extension." Sensors 21, no. 22 (2021): 7771. http://dx.doi.org/10.3390/s21227771.

Full text
Abstract:
Commodity processor architectures are releasing various instruction set extensions to support security solutions for the efficient mitigation of memory vulnerabilities. Among them, tagged memory extension (TME), such as ARM MTE and SPARC ADI, can prevent unauthorized memory access by utilizing tagged memory. However, our analysis found that TME has performance and security issues in practical use. To alleviate these, in this paper, we propose CoMeT, a new instruction set extension for tagged memory. The key idea behind CoMeT is not only to check whether the tag values in the address tag and memory tag are matched, but also to check the access permissions for each tag value. We implemented the prototype of CoMeT on the RISC-V platform. Our evaluation results confirm that CoMeT can be utilized to efficiently implement well-known security solutions, i.e., shadow stack and in-process isolation, without compromising security.
APA, Harvard, Vancouver, ISO, and other styles
9

Toymentsev, Sergey. "Russia's Historical Memory: Strict-Security or Hybrid?" Ab Imperio 2013, no. 2 (2013): 336–45. http://dx.doi.org/10.1353/imp.2013.0042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

English, Erin. "New PCMCIA card offers security and memory." Computer Fraud & Security Bulletin 1995, no. 3 (1995): 5–6. http://dx.doi.org/10.1016/0142-0496(95)80128-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Carboni, Roberto, and Daniele Ielmini. "Stochastic Memory Devices for Security and Computing." Advanced Electronic Materials 5, no. 9 (2019): 1900198. http://dx.doi.org/10.1002/aelm.201900198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Chien, Jason. "Meeting the Memory Challenge." New Electronics 54, no. 15 (2021): 18–22. http://dx.doi.org/10.12968/s0047-9624(22)60520-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Harum, Dana Putri, Aminudin Aminudin, and Sofyan Arifianto. "Improvisasi algoritma advanced encryption standard (AES) dengan melakukan pemetaan s-box pada modifikasi mixcolumns." Jurnal Repositor 1, no. 2 (2019): 95. http://dx.doi.org/10.22219/repositor.v1i2.813.

Full text
Abstract:
AbstrakAlgoritma kriptografi merupakan salah satu unsur penting dalam pengamanan data. Berbagai improvisasi pengembangan algoritma telah dilakukan untuk mengoptimalisasikan kemanan proses pertukaran dalam suata jaringan data. Efisiensi performa menjadi salah satu pertimbangan penggunaan algoritma tertentu. AES memiliki keamanan super yang hingga saat ini keamanannya hanya dapat ditembus dengan waktu sekitar tahun dan semilyar processor. Kompleksitas keamanan AES sebanding dengan penggunaan penggunaan memori serta waktu yang dibutuhkan untuk memproses enkripsi dan dekripsi data begitu besar. Penelitian ini melakukan modifikasi lookup table sbox dan constant matrix pada mixcolumns. Improvisasi tersebut dilakukan dengan harapan mampu meningkatkan performa agar menjadi lebih efisien. Pengujian yang dilakukan terhadap penggunaan memori, waktu komputasi serta persentase avalanche effect masing – masing memiliki selisih sebesar 24mb, 18.9 detik, serta peningkatan avalanche effect sebesar 0.92%. berdasarkan data tersebut dapat diketahui bahwa performa pada improvisasi AES ini telah mampu meningkatakan performa algoritma dengan mereduksi waktu dan memori serta meningkatkan persentase avalanche effect.Cryptographic algorithm is an important element in data security. Any improvised of algorithm development has been carried out to optimize the security of the exchange process in a data network environment. Performance efficiency is one of the considerations of using algorithms. AES has a super security nowaday and its security can only be broken about years and a billion processors. The complexity of AES security is proportional with the memory usage and the time are needed to process encryption and decryption of data is huge. This study modified the sbox table and constant matrix in mixcolumns. That Improvement is expected of being able to improve the performance to become more efficient. Tests carried out on memory usage, computation time and the percentage of avalanche effect which have a difference of 24MB, 18.9 seconds, and an increase in the avalanche effect of 0.92%. based on the data, it can be known that the performance of the AES has been able to improve the performance of the algorithm by reducing time and memory also it is increasing the percentage of avalanche effect
APA, Harvard, Vancouver, ISO, and other styles
14

Jagdish Jangid. "Secure Microservice Communication in Optical Networks." Journal of Information Systems Engineering and Management 10, no. 21s (2025): 911–26. https://doi.org/10.52783/jisem.v10i21s.3455.

Full text
Abstract:
As optical network functions increasingly adopt microservice architectures, traditional con- tainer security mechanisms are proving insufficient against sophisticated attacks targeting these critical infrastructure components. This paper introduces a novel framework for securing microser- vice communications in optical networks through the application of Memory Protection Keys (MPK) for enhanced container isolation. Converging containerization technologies with optical networking introduces unique security challenges, particularly in maintaining isolation between sensitive optical control functions while preserving the ultra-low latency requirements essential for network operations. The proposed approach leverages hardware-enforced memory isolation provided by Intel MPK to establish secure domains for optical control functions without sacrificing performance in latency-sensitive applications. The framework includes zero-copy communication protocols between isolated domains, runtime verification through eBPF-based monitoring, and hardware-assisted security mechanisms specifically designed for optical control plane operations. This work addresses the growing tension between security requirements and performance con- straints in software-defined optical networks, offering a balanced approach that improves container security while respecting the strict operational parameters of modern optical control systems.
APA, Harvard, Vancouver, ISO, and other styles
15

Tahir, Shahzaib, Hasan Tahir, Ruhma Tahir, Muttukrishnan Rajarajan, and Haider Abbas. "Water Is a Viable Data Storage Medium: A Security and Privacy Viewpoint." Electronics 11, no. 5 (2022): 818. http://dx.doi.org/10.3390/electronics11050818.

Full text
Abstract:
The security of IoT devices is a major concern that needs to be addressed for their wide adoption. Users are constantly seeking devices that are faster and capable of holding large amounts of data securely. It is purported that water has memory of its own and the ability to retain memory of the substances that are dissolved into it, even after being substantially and serially diluted. It was also observed in the lab setting that the microscopic pattern of water obtained from the same vessel by different people is unique but can easily distinguish those individuals if the same experiment is executed repeatedly. Furthermore, extensive research is already underway that explores the storage of data on water and liquids. This leads to the requirement of taking the security and privacy concerns related to the storage of data on water into consideration, especially when the real-time collection of data related to water through the IoT devices is of interest. Otherwise, the water memory aspect may lead to leakage of the data and, consequently, the data owners identity. Therefore, this article for the first time highlights the security and privacy implications related to water memory and discusses the possible countermeasures to effectively handle these potential threats. This article also presents a framework to securely store sensitive data on water. The proof-of-concept prototype is implemented and tested over a real-world dataset to analyze the feasibility of the proposed framework. The performance analysis yields that the proposed framework can be deployed once data storage on water is widely used.
APA, Harvard, Vancouver, ISO, and other styles
16

Gordon, Holden, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, and Fatemeh Tehranipoor. "Flash-Based Security Primitives: Evolution, Challenges and Future Directions." Cryptography 5, no. 1 (2021): 7. http://dx.doi.org/10.3390/cryptography5010007.

Full text
Abstract:
Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inherent process variation in the characteristics of flash memory modules, they can provide a unique fingerprint for a device and have thus been proposed as locations for hardware security primitives. These primitives include physical unclonable functions (PUFs), true random number generators (TRNGs), and integrated circuit (IC) counterfeit detection. In this paper, we evaluate the efficacy of flash memory-based security primitives and categorize them based on the process variations they exploit, as well as other features. We also compare and evaluate flash-based security primitives in order to identify drawbacks and essential design considerations. Finally, we describe new directions, challenges of research, and possible security vulnerabilities for flash-based security primitives that we believe would benefit from further exploration.
APA, Harvard, Vancouver, ISO, and other styles
17

Yan, Pengbo, and Toby Murray. "SecRSL: security separation logic for C11 release-acquire concurrency." Proceedings of the ACM on Programming Languages 5, OOPSLA (2021): 1–26. http://dx.doi.org/10.1145/3485476.

Full text
Abstract:
We present Security Relaxed Separation Logic (SecRSL), a separation logic for proving information-flow security of C11 programs in the Release-Acquire fragment with relaxed accesses. SecRSL is the first security logic that (1) supports weak-memory reasoning about programs in a high-level language; (2) inherits separation logic’s virtues of compositional, local reasoning about (3) expressive security policies like value-dependent classification. SecRSL is also, to our knowledge, the first security logic developed over an axiomatic memory model. Thus we also present the first definitions of information-flow security for an axiomatic weak memory model, against which we prove SecRSL sound. SecRSL ensures that programs satisfy a constant-time security guarantee, while being free of undefined behaviour. We apply SecRSL to implement and verify the functional correctness and constant-time security of a range of concurrency primitives, including a spinlock module, a mixed-sensitivity mutex, and multiple synchronous channel implementations. Empirical performance evaluations of the latter demonstrate SecRSL’s power to support the development of secure and performant concurrent C programs.
APA, Harvard, Vancouver, ISO, and other styles
18

Akdemir, Bayram, and Hasan Üzülmez. "Providing Security of Vital Data for Conventional Microcontroller Applications." Applied Mechanics and Materials 789-790 (September 2015): 1059–66. http://dx.doi.org/10.4028/www.scientific.net/amm.789-790.1059.

Full text
Abstract:
Microcontrollers are widely used in industrial world, and almost all kind of devices were based on microcontroller to achieve high flexibility and abilities. All microcontrollers have nonvolatile and volatile memories to execute the software. During the running, microcontroller calculates many variables and records them to any non-volatile memory to use later. After re-energizing, microcontroller takes the data calculated before the power off and executes the program. In case of any electrical writing error or any power loss during the writing procedure, un-written memory blocks or any un-written data leads to malfunctions. Proposed method uses a gray code based signed two memory blocks to secure the memory reserved for data. Microcontroller uses these memory blocks in alternately. Even if microcontroller has no any real-time ability, gray code provides a guarantee which block is written in last. For every re-starting microcontroller dos not lose the data. In case of any reading problem during the starting, microcontroller has two chances to decide the action. One is to start with default values and the other is to start with the previous data. This study is tested at elevator applications not to lose position and vital values.
APA, Harvard, Vancouver, ISO, and other styles
19

Sepúlveda, Johanna, Felix Wilgerodt, and Michael Pehl. "Towards memory integrity and authenticity of multi-processors system-on-chip using physical unclonable functions." it - Information Technology 61, no. 1 (2019): 29–43. http://dx.doi.org/10.1515/itit-2018-0030.

Full text
Abstract:
Abstract A persistent problem for modern Multi-Processors System-on-Chip (MPSoCs) is their vulnerability to code injection attacks. By tampering the memory content, attackers are able to extract secrets from the MPSoC and to modify or deny the MPSoC’s operation. This work proposes SEPUFSoC (Secure PUF-based SoC), a novel flexible, secure, and fast architecture able to be integrated into any MPSoC. SEPUFSoC prevents execution of unauthorized code as well as data manipulation by ensuring memory integrity and authentication. SEPUFSoC achieves: i) efficiency, through the integration of a fast and lightweight hash function for Message Authentication Code (MAC) generation and integrity verification of the memory lines at runtime; and ii) lightweight security, through the use of a Physical Unclonable Function (PUF) to securely generate and store the cryptographic keys that are used for the application authentication. We discuss the security and performance of SEPUFSoC for single core and multi-core systems. Results show that the SEPUFSoC is a secure, fast, and low overhead solution for MPSoCs. We discuss the SEPUFSoC security and cost, which strongly depends on the PUF and hash selection. In the future, new technologies may allow the exploration of different PUFs.
APA, Harvard, Vancouver, ISO, and other styles
20

Rahman, Nashrullah Mujibur, Didik Tristianto, and Slamet Winardi. "Design and Build Security for Opening and Closing a House Fence using a Microcontroller-Based Remote Control." Natural Sciences Engineering and Technology Journal 1, no. 2 (2021): 54–57. http://dx.doi.org/10.37275/nasetjournal.v1i2.10.

Full text
Abstract:
Home security is an inevitable need. The security system on the fence by entering a password on the remote control allows ensuring security. This study aims to design a security system technology that is automated when the homeowner enters a pre-set password/passcode. All of these systems are connected to the ATmega8535 microcontroller which has been programmed using the Code Vision Avr software stored in the ATmega8535 microcontroller memory and supporting memory as a means of storing password data.
APA, Harvard, Vancouver, ISO, and other styles
21

Sevastianova, Yaroslava, and Dmitriy Efremenko. "Securitization of memory and dilemma of mnemonic security." Political Science (RU), no. 2 (2020): 66–86. http://dx.doi.org/10.31249/poln/2020.02.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Davies, Nigel, Adrian Friday, Sarah Clinch, et al. "Security and Privacy Implications of Pervasive Memory Augmentation." IEEE Pervasive Computing 14, no. 1 (2015): 44–53. http://dx.doi.org/10.1109/mprv.2015.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Wang, Xueyan, Jienlei Yang, Yinglin Zhao, Xiaotao Jia, Gang Qu, and Weisheng Zhao. "Hardware Security in Spin-based Computing-in-memory." ACM Journal on Emerging Technologies in Computing Systems 16, no. 4 (2020): 1–18. http://dx.doi.org/10.1145/3397513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Biswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas, and Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing." EDFA Technical Articles 24, no. 4 (2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.

Full text
Abstract:
Abstract This article describes how physical attacks can be launched on different types of nonvolatile memory (NVM) cells using failure analysis tools. It explains how the bit information stored inside these devices is susceptible to read-out and fault injection attacks and defines vulnerability parameters to help quantify risks associated with different modalities of attack. It also presents an in-depth security analysis of emerging NVM technologies and discusses potential countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
25

Wu, Jin, and Yi Huai Wang. "Protection Mechanisms and Security Operations of XS128 Flash Memory." Advanced Materials Research 403-408 (November 2011): 1767–71. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.1767.

Full text
Abstract:
In this paper we study the protection mechanisms and security operations of XS128 Flash memory. By introducing the configuration regions in XS128 Flash memory, we elaborate P-FLASH/D-FLASH Protection Mechanisms and protection register FPROT/DFPROT. Besides, we put forward encryption/decryption methods to guarantee the security of MCU.
APA, Harvard, Vancouver, ISO, and other styles
26

Druchek, Olena. "HISTORICAL (NATIONAL) MEMORY POLICY IN THE CONTEXT OF SECURITY PROBLEMS IN UKRAINE." Науковий вісник Київського інституту Національної гвардії України, no. 1 (June 30, 2025): 151–59. https://doi.org/10.59226/2786-6920.1.2025.151-159.

Full text
Abstract:
The article substantiates the importance of studying the problems of historical memory and the politics of historical (national) memory today, during the period of Russia’s armed aggression and information war against Ukraine, the manifestation of which is the transfer of the confrontation into the sphere of public consciousness and collective historical memory. It is proved that the above is due to the role played by historical memory and the policy of historical (national) memory in the processes of national identification, nation-building and state-building, ensuring national security, determining the political future of the Ukrainian the state and the Ukrainian nation. The main approaches to the concept of historical memory are analyzed and its understanding is proposed as reflected in the collective consciousness of knowledge and reflection on events, traditions, ideas and theories, with the help of which the people (ethnic community) realizes and preserves its past. An understanding of the concept of the policy of historical (national) memory as a set of social practices aimed at the representation (modification) of certain images of the common past, actualized by the modern political context, is proposed. It has been proven that in modern democracies, the formation (construction) of memory policy is one of the directions of state policy. It is proven that the policy of historical (national) memory is objectified in the form of legislation, strategies, concepts that determine the ways of reproducing past events or memory in society, being incorporated into political declarations, government programs, commemorative practices, memorial objects. The purpose of the politics of memory is to form a collective interpretation of the past and to identify certain events, symbols or personalities that should be commemorated in society. It is substantiated that the crisis state of historical memory in modern Ukrainian society, together with the shortcomings and gaps in the past implementation of the policy of historical (national) memory, especially under the conditions of information warfare and the influence of hostile propaganda, can hinder the unity of society, cause a serious threat to social harmony and national security. Emphasis is placed on the priority of the task for state bodies and civil society of forming a consolidated model of historical (national) memory, and it is stated that such a policy should be balanced, take into account modern realities and be based on a strong legislative basis. It has been proven that in the conditions of Ukraine’s ongoing war with the Russian aggressor, the policy of historical (national) memory should be based on the previous and recent experience of the struggle of the Ukrainian people against Russian colonialism and aggression, as well as on historical facts, events, personalities, symbols that citizens of Ukraine consider important in the context of state formation and ensuring national security, regardless of the historical, political, and social context of their formation. Emphasis is placed on the importance of such a component of the policy of national memory as honoring and respecting the heroes and heroines of the ongoing war. As the prospects for further research, the expansion of scientific approaches to the study of the peculiarities of the historical memory of the Ukrainian nation and the policy of historical (national) memory in Ukraine, in order to accelerate the formation of their consolidated, objective, non-controversial models, is defined. It was emphasized that the main strategies and mechanisms used for the construction of national memory, as well as an assessment of their impact on the state of national and state security, require further research.
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Jian, and Ying Li. "RDAMS: An Efficient Run-Time Approach for Memory Fault and Hardware Trojans Detection." Information 12, no. 4 (2021): 169. http://dx.doi.org/10.3390/info12040169.

Full text
Abstract:
Ensuring the security of IoT devices and chips at runtime has become an urgent task as they have been widely used in human life. Embedded memories are vital components of SoC (System on Chip) in these devices. If they are attacked or incur faults at runtime, it will bring huge losses. In this paper, we propose a run-time detection architecture for memory security (RDAMS) to detect memory threats (fault and Hardware Trojans attack). The architecture consists of a Security Detection Core (SDC) that controls and enforces the detection procedure as a “security brain”, and a memory wrapper (MEM_wrapper) which interacts with memory to assist the detection. We also design a low latency response mechanism to solve the SoC performance degradation caused by run-time detection. A block-based multi-granularity detection approach is proposed to render the design flexible and reduce the cost in implementation using the FPGA’s dynamic partial reconfigurable (DPR) technology, which enables online detection mode reconfiguration according to the requirements. Experimental results show that RDAMS can correctly detect and identify 10 modeled memory faults and two types of Hardware Trojans (HTs) attacks without leading a great performance degradation to the system.
APA, Harvard, Vancouver, ISO, and other styles
28

Jagiełło-Szostak, Anna. "Links between foreign and security policy and historical memory: the case of Serbia – Kosovo relations." Rocznik Instytutu Europy Środkowo-Wschodniej 18, no. 2 (2020): 59–84. http://dx.doi.org/10.36874/riesw.2020.2.3.

Full text
Abstract:
The article aims to analyse the impact of historical memory on foreign and security policy using the example of the Serbia – Kosovo relations in the period of 2014-2019. Historical memory is a burden, challenge and opportunity for foreign and security policy, and has a considerable impact on bilateral relations between countries which used to be in conflict. Historical memory generates numerous research questions – who is the architect of memory? what are the actors? what are the mechanisms, tools and instruments of its creation? how is it used to maintain power and what are its effects? – to name but a few. In the example analysed, leaders use historical memory to create separate identities and gain power, whereas NGOs do it to commemorate victims. Historical memory is present in celebrating important dates, historical places, monuments and events, and creating national heroes. It also draws attention to the stereotypes in school textbooks and to transitional justice. The most important space for historical memory in the analysis is Kosovo and the role of an international organisation – the North Atlantic Treaty Organization (NATO). Historical memory has an important function in the process of regional reconciliation, which is an essential condition for cooperation and security in the Western Balkans.
APA, Harvard, Vancouver, ISO, and other styles
29

Vellanki, Ravi Babu. "PostgreSQL Configuration: Best Practices for Performance and Security." European Journal of Computer Science and Information Technology 13, no. 47 (2025): 172–82. https://doi.org/10.37745/ejcsit.2013/vol13n47172182.

Full text
Abstract:
PostgreSQL configuration significantly impacts database performance and security, yet default settings often prioritize compatibility over optimization. This article presents a comprehensive framework for PostgreSQL configuration, addressing critical aspects including memory allocation, query planning, security hardening, and monitoring. By examining the interdependencies between configuration parameters and their effects on system behavior under various workloads, the article provides a structured approach to database optimization. Memory allocation strategies focus on shared buffers, work memory, and background writer settings to maximize performance while preventing resource contention. Query performance optimization encompasses planner configuration, autovacuum tuning, and parallel execution capabilities to enhance throughput and reduce latency. Security hardening measures include network protection, authentication controls, privilege management, and vulnerability mitigation techniques to safeguard data while maintaining functionality. Comprehensive logging and monitoring strategies enable proactive identification of performance bottlenecks and security threats. Together, these best practices enable organizations to implement secure, high-performance PostgreSQL environments tailored to their specific requirements.
APA, Harvard, Vancouver, ISO, and other styles
30

JIBIN JOY and Dr. S. Devaraju. "AVOIDANCE OF DUPLICACY AND COMPELLING CLOUD SECURITY INDIFFERENT CLOUD SITUATIONS." INTERNATIONAL JOURNAL OF CREATIVE RESEARCH THOUGHTS 11, no. 11 (2023): a543—a555. http://dx.doi.org/10.56975/1k890v13.

Full text
Abstract:
Data deduplication is necessary for making data smaller and preventing duplication when transferring it. It is often used in cloud computing to increase the amount of data that can be transferred and reduce the amount of memory used. During the deduplication handle, delicate information integrity is safeguarded by means of an encryption approach, sometimes recently being redistributed. The SHA calculation is broadly utilized to store content information. The content is padded to make the security bits. During the deduplication handle, it computes the hash, which consists of hexadecimal, string, and integer information. The term "Hash-based deduplication" technique called hashing used to identify and remove duplicate records. The hash values of content information are important characteristics. Customers who share data with the cloud verify that copies of the data are stored in the cloud, unlike traditional methods of removing duplicate data. Strong limitations on virtualization include restricting the capacity of essential memory and preventing memory hindrance. Memory deduplication finds pages with the same content and combines them into a single information record to move forward performance whereas utilizing less memory. The MPT is used in cloud storage to remove duplicate information and store only one copy for multiple users. To keep cloud information safe, data is mixed up before and during deduplication.
APA, Harvard, Vancouver, ISO, and other styles
31

Yahia, Alemami, M. Al-Ghonmein Ali, G. Al-Moghrabi Khaldun, and Afendee Mohamed Mohamad. "Cloud data security and various cryptographic algorithms." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1867–79. https://doi.org/10.11591/ijece.v13i2.pp1867-1879.

Full text
Abstract:
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.
APA, Harvard, Vancouver, ISO, and other styles
32

Widya Dwi Agustin, A. Dhyta Maulana, Dede Wirta, and Didik Aribowo. "Studi Perbandingan Antara Memori DRAM dan Memori SRAM Dalam Sistem Keamanan Komputer." Jurnal Teknik Mesin, Industri, Elektro dan Informatika 2, no. 4 (2023): 01–10. http://dx.doi.org/10.55606/jtmei.v2i4.2747.

Full text
Abstract:
The ever-evolving digital world has made computer security an increasingly important and urgent issue. Computer security refers to a set of practices, policies and technologies designed to protect computer systems, networks and data from threats such as cyber attacks, data theft and software damage. The purpose of this research is to compare DRAM memory and SRAM memory in computer security systems. This research uses the library research method, which is the collection of information or scientific papers related to literature reviews that are literature. the selection between DRAM and SRAM must consider physical and software security needs, as well as system performance and power consumption.
APA, Harvard, Vancouver, ISO, and other styles
33

Dener, Murat. "Comparison of Encryption Algorithms in Wireless Sensor Networks." ITM Web of Conferences 22 (2018): 01005. http://dx.doi.org/10.1051/itmconf/20182201005.

Full text
Abstract:
In general, Wireless Sensor Networks occur when sensor nodes are randomly left in an unreliable environment. Sensor node has limited processor, limited memory, limited radio capacity and low cost. In sensor network applications, security mechanisms must be used, because of unsafe environments, excessive number of sensor nodes, and wireless communication environments. Ensuring confidentiality, the primary goal of security, is one of the most important problems to be solved in order to realize time and vital objectives. While ensuring security, it is also necessary to consider other important criteria such as memory usage, energy and latency of Sensor Networks. In this study, encryption is described in Wireless Sensor Networks and Skipjack, XXTEA and AES encryption algorithms are compared using TOSSIM simulation program in TinyOS operating system considering memory usage, energy and delay criteria. The study is considered to be useful academicians who study security in Wireless Sensor Networks.
APA, Harvard, Vancouver, ISO, and other styles
34

Mamta Rani. "Database security at cache layer." International Journal of Science and Research Archive 9, no. 2 (2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.

Full text
Abstract:
As database security is the main concern, we are going to place an encryption module at the cache layer. All the encryption and decryption will be done at the cache layer before storing that data to the database, which will provide more security to the database Higher level security should be provided to the database so here we are placing an idea of Elliptical Curve Cryptography. A database is a collection of data that helps us to collect, retrieve, organize and manage the data in an efficient and effective manner. Databases are critical assets. They store client details, financial information, personal files, company secrets and other data necessary for business. Today database security is getting greater importance than the past which is the amount of data is stored in a corporate database is increasing. People are depending more on the corporate data for making a decision, management of customer service and supply chain management etc. Data stored in databases is usually very vulnerable data so it becomes very important and crucial to maintain this data securely. There are many front end applications that fetch data from secondary storage to main memory for processing and from main memory, data is stored in cache for temporary processing. Any loss or unavailability of data may seriously affect its performance. The database security should provide protected access to the contents of a database and should preserve the integrity, availability, consistency, and quality of the data. In this paper, I present a model where data is protected even on cache layer.
APA, Harvard, Vancouver, ISO, and other styles
35

Pakhomenko, Sergii, and Olga Sarajeva. "Securitization of Memory: a Theoretical Framework to Study the Latvian Case." Przegląd Strategiczny, no. 13 (December 31, 2020): 395–410. http://dx.doi.org/10.14746/ps.2020.1.24.

Full text
Abstract:
The article suggests and argues a theoretical framework for studying a particular case of memory securitization. It is based on the constructivist perception of security that is systematically framed in the studies of representatives of the Copenhagen School, who consider security as a socially constructed phenomenon and define identity protection to be one of its primary goals.
 Pursuant to this approach, the article presents a correlation between memory and security in at least three aspects. In the first instance, similar to security, collective memory is socially determined. In the second instance, collective memory lies at the core of various forms of identity, including national identity. In the third instance, collective memory is not only an object of protection but also a resource, which is used by securitization actors for threat identification, enemy image modeling as well as for defining the means of protection.
 The Latvian case is applied for setting the theoretical framework of the memory securitization model. In future, it might be used to study specific juridical and political mechanisms of memory securitization in the countries of Central and Eastern Europe.
 The authors perceive the securitization of memory as a diverse complex of measures aimed at establishing and setting a certain historical narrative, as well as convincing society to be actively loyal to it. Accordingly, the policy of memory is defined as a mechanism for putting securitization in practice. The initial conditions for understanding this process in Latvia are the post-communist transition, ethnocultural divisions of the society, and the external factor represented by Russia, that promotes its historical narratives.
 In one respect, R. Brubaker’s concept of the “nationalized” state is taken as a theoretical model of the politics of memory in Latvia. According to this concept, the official narrative of post-communist countries has been set as a nation-oriented one. On the other hand, the concept of the memory regime developed by M. Bernhard and J. Kubik is also considered. As per their theory, the memory regime in Latvia can be described as being divided into the official and alternative narrative of counter-memory, which is based on the Soviet legacy.
APA, Harvard, Vancouver, ISO, and other styles
36

Gustafsson, Karl. "International reconciliation on the Internet? Ontological security, attribution and the construction of war memory narratives in Wikipedia." International Relations 34, no. 1 (2019): 3–24. http://dx.doi.org/10.1177/0047117819864410.

Full text
Abstract:
This article explores the Internet’s often touted potential for facilitating reconciliation. It conceptualises Wikipedia as a site for collective memory construction and analyses the Chinese- and Japanese-language entries on the bilaterally contentious Second Sino-Japanese War. It addresses the question of how to make sense of the construction of these online collective memory narratives theoretically. Both historical determinism and instrumentalism – two influential theoretical approaches to collective memory and reconciliation – have great difficulties in fully accounting for this case. Instead, it is argued that ontological security theory is better equipped for understanding collective memory construction in Wikipedia. It is suggested that ontological security seeking can impede efforts for reconciliation even when, as in Wikipedia, there exist norms seeking to promote more neutral narratives. It is argued that a subtle bias in favour of the in-group and against the out-group functions as a mechanism for ontological security management that protects a positive self-identity.
APA, Harvard, Vancouver, ISO, and other styles
37

Al-Ameen, Mahdi Nasrullah, S. M. Taiabul Haque, and Matthew Wright. "Leveraging autobiographical memory for two-factor online authentication." Information & Computer Security 24, no. 4 (2016): 386–99. http://dx.doi.org/10.1108/ics-01-2016-0005.

Full text
Abstract:
Purpose Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords serve as the first authentication factor, a common approach to implementing the second factor is sending a one-time code, either via e-mail or text message. The prevalence of smartphones, however, creates security risks in which a stolen phone leads to user’s accounts being accessed. Physical tokens such as RSA’s SecurID create extra burdens for users and cannot be used on many accounts at once. This study aims to improve the usability and security for two-factor online authentication. Design/methodology/approach The authors propose a novel second authentication factor that, similar to passwords, is also based on something the user knows but operates similarly to a one-time code for security purposes. The authors design this component to provide higher security guarantee with minimal memory burden and does not require any additional communication channels or hardware. Motivated by psychology research, the authors leverage users’ autobiographical memory in a novel way to create a secure and memorable component for two-factor authentication. Findings In a multi-session lab study, all of the participants were able to log in successfully on the first attempt after a one-week delay from registration and reported satisfaction on the usability of the scheme. Originality/value The results indicate that the proposed approach to leverage autobiographical memory is a promising direction for further research on second authentication factor based on something the user knows.
APA, Harvard, Vancouver, ISO, and other styles
38

Rimaitė-Beržiūnienė, Viktorija. "Visual Securitization: Commemorating the Partisan War in Lithuanian Foreign and Security Policy." Politologija 106, no. 2 (2022): 11–52. http://dx.doi.org/10.15388/polit.2022.106.1.

Full text
Abstract:
In 2008 and 2014 the Russian-Georgian war, the military conflict in Ukraine, and the annexation of Crimea have had an impact on Lithuanian foreign and security policy. In the context of these events, Lithuania was concerned about the mobilization of conventional security measures, i.e., strengthening its national defense sector. However, the role as well as the impact of “soft” (unconventional) response devices and strategies in the Lithuanian case has still received little academic interest. This paper, using the analysis of visual collective memory practices (monuments), aims to show the links between collective memory as well as its visually tangible forms and the formation of foreign and security policy in Lithuania. By examining the visual practices reminiscent of guerrilla warfare built in Lithuanian public spaces after 2014, it is revealed how the use of collective memory contributed to the perceived threat from Russia, which had a significant impact on the formation and implementation of foreign and security policy.
APA, Harvard, Vancouver, ISO, and other styles
39

Alemami, Yahia, Ali M. Al-Ghonmein, Khaldun G. Al-Moghrabi, and Mohamad Afendee Mohamed. "Cloud data security and various cryptographic algorithms." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1867. http://dx.doi.org/10.11591/ijece.v13i2.pp1867-1879.

Full text
Abstract:
<p>Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.</p>
APA, Harvard, Vancouver, ISO, and other styles
40

Mufidah, Nada Fajri, and Hilal Hudan Nuha. "Performance and Security Analysis of Lightweight Hash Functions in IoT." Jurnal Informatika: Jurnal Pengembangan IT 9, no. 3 (2024): 264–70. https://doi.org/10.30591/jpit.v9i3.7633.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) devices across various sectors, including healthcare, automotive, smart homes, and agriculture, has created a need for robust security measures that do not compromise the limited resources of these devices. This study analyses the performance and security of several lightweight cryptographic hash functions, specifically SHAKE128, BLAKE2s, SHA-256, SHA3-256, SipHash and xxHash, within the context of the Internet of Things (IoT). A series of experiments conducted on the Arduino Uno platform allows for an evaluation of these functions in terms of throughput, memory usage, and avalanche effect. The findings indicate that while SHAKE128 and SHAKE256 demonstrate superior throughput, they require greater memory, particularly with larger input sizes. BLAKE2s exhibits a robust equilibrium between throughput, memory efficiency, and consistent avalanche effects, rendering it a dependable option for 256-bit outputs. Conversely, xxHash and SipHash provide high throughput and minimal memory usage, yet exhibit reduced avalanche effects. The findings of this research provide critical insights for developers and researchers on the selection of appropriate cryptographic solutions, which must be tailored to the constraints and security requirements of IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
41

Gustafsson, Karl. "Memory Politics and Ontological Security in Sino-Japanese Relations." Asian Studies Review 38, no. 1 (2013): 71–86. http://dx.doi.org/10.1080/10357823.2013.852156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Iyengar, Anirudh Srikant, Swaroop Ghosh, and Kenneth Ramclam. "Domain Wall Magnets for Embedded Memory and Hardware Security." IEEE Journal on Emerging and Selected Topics in Circuits and Systems 5, no. 1 (2015): 40–50. http://dx.doi.org/10.1109/jetcas.2015.2398232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Mahdi, Hussain. "KERBEROS SECURITY EVALUATION." Diyala Journal of Engineering Sciences 1, no. 1 (2008): 152–63. http://dx.doi.org/10.24237/djes.2008.01111.

Full text
Abstract:
Authentication of a person is an important task in many areas of day-to-day life including electronic commerce, system security and access control. We present Kerberos a client\server authentication protocol which can perform a secure communication over unsecured environments (internet). For example an e-bank application the client can log on in domain environment using password (single factor authentication) or a smart card running java card application in combine with PIN and the server is the banking hosted system at the bank. Smart card can enhance the security by storing the cryptographic key to perform dual factor authentication, it also can manage the encryption and decryption of the Kerberos keys on it rather then on the client workstation memory. A common methodology depends on the national standardizations is used to evaluate security of that authentication scenarios of Kerberos protocol.
APA, Harvard, Vancouver, ISO, and other styles
44

Alshannaq, Osama, Mohd Rizuan Baharon, Jamil Abedalrahim Jamil Alsayaydeh, et al. "Analysis of the Lowest Memory Consumption (Memory Usage) Through Running Different Cryptography Techniques for Different Types of Images." Journal of Physics: Conference Series 2319, no. 1 (2022): 012027. http://dx.doi.org/10.1088/1742-6596/2319/1/012027.

Full text
Abstract:
Abstract Nowadays security of image communication systems is highly important. It is essential to provide protection for image data confidentiality from illegal users. The detection and identification of unauthorized users is still a difficult and complex task. Many researchers have proposed several works to provide security of the transmission of the image. The objective of this article is to provide a comparative study of the current techniques that have been widely used. This article concentrates on various types of cryptography algorithms that are existing, like AES, MAES, DES, 3DES, RSA, and Blowfish, and investigation the lowest energy consumption (memory usage) through running several cryptographic algorithms on different image formatting.
APA, Harvard, Vancouver, ISO, and other styles
45

Krishna, Prasad K. "Securing the Internet of Things: A Comprehensive Analysis of Lightweight Cryptographic Approaches for Resource-Constrained Devices." International Journal of Information Technology Research Studies (IJITRS) 1, no. 1 (2025): 20–35. https://doi.org/10.5281/zenodo.15309858.

Full text
Abstract:
The rapid proliferation of Internet of Things (IoT) devices has introduced significant security challenges due to their resource constraints and widespread deployment in critical applications. This research examines lightweight cryptographic approaches that can provide robust security for IoT communication while operating within the severe computational, memory, and energy limitations of IoT devices. Through systematic analysis of existing lightweight cryptographic primitives, protocols, and frameworks, this paper identifies the most promising solutions for securing IoT ecosystems. Our findings indicate that optimized implementations of established algorithms like AES, novel lightweight block ciphers such as PRESENT and SIMON, and emerging post-quantum resistant schemes offer viable security options for different IoT deployment scenarios. The research also evaluates implementation challenges, performance metrics, and security-efficiency tradeoffs across various IoT application domains. This comprehensive analysis contributes to the growing body of knowledge on IoT security by providing a structured evaluation framework for selecting appropriate lightweight cryptographic solutions based on specific IoT device constraints and security requirements.
APA, Harvard, Vancouver, ISO, and other styles
46

Li, Sijia, Zhiyi Liao, Zhengyang Wu, Zheng Wu, and Lin Ding. "(Quantum) Time-Memory-Data Tradeoff Attacks on the SNOW-V Stream Cipher." Symmetry 14, no. 6 (2022): 1127. http://dx.doi.org/10.3390/sym14061127.

Full text
Abstract:
Symmetric cryptosystems (i.e., stream ciphers and block ciphers) have always played an important part in securing the various generations of 3GPP (3rd Generation Partnership Project) mobile telephony systems. The SNOW-V stream cipher, published in September 2019, is the most recent member of the well-known SNOW family of ciphers. It is designed to provide confidentiality and integrity for 5G communications. There have been no time-memory-data tradeoff (TMDTO) attacks on the cipher published so far. By combining with the BSW sampling technique, we propose TMDTO attacks on SNOW-V. The results show that the attacker can mount a TMDTO attack, where none of the online time complexity, the memory complexity and the offline time complexity are bigger than 2256, if the keystream sequences generated by the secret key, together with different IVs, are provided to the attacker. Furthermore, we analyze the security of SNOW-V against quantum TMDTO attacks, and the results show that a quantum TMDTO attack offers, strictly, better online time complexity than Grover’s algorithm, when the available memory space is bigger than 2170.67. These results are helpful in evaluating the security of SNOW-V against (quantum) TMDTO attacks.
APA, Harvard, Vancouver, ISO, and other styles
47

Bonchev, Miroslav. "Atomic Memory Model." Mathematics, Computer Science and Education 7, no. 2 (2024): 83–93. https://doi.org/10.54664/fpky9556.

Full text
Abstract:
Memory leaks and buffer overruns are among the most common erroneous conditions in computer systems. They are also among the most tedious, difficult and time consuming to detect, identify, locate, and resolve. Both Microsoft and Google independently report that memory safety issues cause 70% of all security vulnerabilities [10]. The Atomic Memory Model provides a mechanism for resolving these types of errors. Simultaneously, it makes the software architecture more robust and elegant by enforcing a code hierarchy regarding the memory use, as well as allowing for innate memory abstraction that matches the application semantics. The model also significantly increases the speed of the software development by relieving developers from detailed memory management.
APA, Harvard, Vancouver, ISO, and other styles
48

C. Visalatchi. "Enhancing Network Security in Wireless Sensor Networks through Rsa-Based Secure Memory Management and Optimized Resource Allocation: A Comprehensive Survey." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 2777–97. https://doi.org/10.52783/cana.v32.4555.

Full text
Abstract:
To improve the safety of networks in Wireless Sensor Networks (WSNs), this study offers a thorough analysis and presents a unique architecture that combines the best utilization of resources with RSA-based secure control of memory. WSNs are essential for many tasks, including weapons systems and tracking the environment, but because of their centralized architecture and shortages of resources, they are very susceptible to breaches of security. This assessment provides a critical analysis of current security mechanisms, emphasizing resource distribution tactics, memory administration approaches, and methods of encryption particularly designed for wireless sensor networks. Building on these discoveries, the study suggests a novel paradigm for the secure utilization of memory in sensor networks that makes use of the RSA encryption method to protect information security and secrecy. While upholding stringent safety criteria, the structure uses effective utilization of resources approaches to increase WSNs' overall effectiveness and efficacy. The proposed method provides a strong solution that improves operational effectiveness and security while addressing the particular difficulties presented by WSNs.
APA, Harvard, Vancouver, ISO, and other styles
49

Elamurugu, V., and D. J. Evanjaline. "DynAuthRoute: Dynamic Security for Wireless Sensor Networks." Indian Journal Of Science And Technology 17, no. 13 (2024): 1323–30. http://dx.doi.org/10.17485/ijst/v17i13.49.

Full text
Abstract:
Objectives: The research aims to design an architecture for secure transmission of data in wireless sensor networks. Methods: The method involves three main pillars: authentication, data encryption, and dynamic routing. Extensive simulations have been conducted to evaluate the suggested method in terms of energy consumption, memory footprint, packet delivery ratio, end-to-end latency, execution time, encryption time, and decryption time. Findings: For authentication, a dynamic key is used to power an improved salt password hashing method. Data encryption is performed using format-preserving encryption (FPE) with the appended salt key. Dynamic routing is implemented using a cluster-based routing technique to enhance network efficiency in terms of power consumption and security. The execution time for MD5 ranges from 15 to 22 milliseconds, while for SHA-1 it ranges from 16 to 23 milliseconds and for the proposed salt key generation it is 1 to 5 milliseconds. Similarly, in terms of energy consumption, memory footprint, packet delivery ratio, end-to-end latency, execution time, encryption time, and decryption time the proposed method shows promising results in ensuring the integrity and security of transmitted encrypted data. Novelty: The presents a novel architecture with enhanced cluster head-based selection algorithm that combines dynamic key-based authentication and secure data routing to establish a safe environment for data transmission in wireless sensor networks. This research works offers a method for encrypting text with a dynamic salt key that is safe, energy-efficient, and lightweight. Keywords: Wireless Sensor Network, Dynamic Key, Authentication, Hash function, Salt algorithm, Dynamic routing, Node clustering, Format-preserving encryption
APA, Harvard, Vancouver, ISO, and other styles
50

Stark, Samuel W., A. Theodore Markettos, and Simon W. Moore. "How Flexible is CXL's Memory Protection?" Queue 21, no. 3 (2023): 54–64. http://dx.doi.org/10.1145/3606014.

Full text
Abstract:
CXL, a new interconnect standard for cache-coherent memory sharing, is becoming a reality - but its security leaves something to be desired. Decentralized capabilities are flexible and resilient against malicious actors, and should be considered while CXL is under active development.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!