Search results for "RATINGS"

showing 10 items of 79 documents

Hypervisor-assisted dynamic malware analysis

2021

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…

Computer engineering. Computer hardwareSoftware_OPERATINGSYSTEMSvirtualisointiComputer Networks and CommunicationsComputer scienceContext (language use)Static program analysiscomputer.software_genreTK7885-7895Artificial IntelligenceComponent (UML)Overhead (computing)tietoturvaMalware analysiskyberturvallisuusbusiness.industryHypervisorQA75.5-76.95haittaohjelmatComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSTask (computing)Electronic computers. Computer scienceEmbedded systemMalwarebusinesscomputerSoftwareInformation SystemsCybersecurity
researchProduct

Too many passwords? : How understanding our memory can increase password memorability

2018

Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related to memory…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSSoftware_OPERATINGSYSTEMSpassword securitymemorabilitytodentamineninformation securitymetamemorysalasanattietoturvahuman memorymuisti (kognitio)
researchProduct

Improving Password Memorability, While Not Inconveniencing the User

2019

Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental groups). Ps…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSSoftware_OPERATINGSYSTEMSpassword securitypassword security behaviorturvallisuuspassword memorabilityuser conveniencemuistaminensalasanatkäyttäjäkokemuspassword verificationtoisto
researchProduct

Undergraduate experiment with fractal diffraction gratings

2011

We present a simple diffraction experiment with fractal gratings based on the triadic Cantor set. Diffraction by fractals is proposed as a motivating strategy for students of optics in the potential applications of optical processing. Fraunhofer diffraction patterns are obtained using standard equipment present in most undergraduate physics laboratories and compared with those obtained with conventional periodic gratings. It is shown that fractal gratings produce self-similar diffraction patterns which can be evaluated analytically. Good agreement is obtained between experimental and numerical results. © 2011 IOP Publishing Ltd.

DiffractionPhysics::OpticsGeneral Physics and Astronomysymbols.namesakeOpticsFractalSelf-similarDiffraction gratingPhysicsOptical processingScience instructionUndergraduate experimentPotential applicationsbusiness.industryPeriodic gratingsDiffraction patternsCantor setsOptical processingFraunhofer diffractionCantor setInterferometryPhysics laboratoriesFractalsInterferometryStandard equipmentsFISICA APLICADAsymbolsNumerical resultsDiffraction gratingsFraunhofer diffraction patternsbusinessExperiments
researchProduct

Sovereign Credit Ratings and Financial Markets Linkages: Application to European Data

2012

We use EU sovereign bond yield and CDS spreads daily data to carry out an event study analysis on the reaction of government yield spreads before and after announcements from rating agencies (Standard & Poor’s, Moody’s, Fitch). Our results show significant responses of government bond yield spreads to changes in rating notations and outlook, particularly in the case of negative announcements. Announcements are not anticipated at 1–2 months horizon but there is bi-directional causality between ratings and spreads within 1–2 weeks; spillover effects especially among EMU countries and from lower rated countries to higher rated countries; and persistence effects for recently downgraded countrie…

Economics and EconometricsCredit rating spreadsYield (finance)Financial marketEvent studyemsSettore SECS-P/02 Politica EconomicaMonetary economicscredit ratings; sovereign yields; rating agencies. Classification-C23; E44; G15.Credit ratingSpillover effectSovereign YieldsCarry (investment)credit ratings rating agencies sovereign yieldsEconomicsGovernment bondSovereign creditCredit Ratingsrating sovereing spreadsRating AgenciesFinanceSSRN Electronic Journal
researchProduct

DIFFERENCES BETWEEN CHILDREN'S SELF-PERCEIVED AND TEACHER RATINGS IN TRAIT EMOTIONAL INTELLIGENCE AND ANXIETY: IS THERE A RELATIONSHIP WITH SCHOLASTI…

2022

The construct of Emotional Intelligence (EI) has been studied as a potential predictor of psychological wellbeing and social interaction during childhood. Among the different possible EI formulations, some studies about Trait EI during development have also focused on its relationship with academic performance. One main limitation pertains the self-report nature of trait EI assessment tools. The use of cross-informant ratings has become an important aspect of research and clinical practice for those working with children and adolescents because potentially resulting in a less biased approach in the evaluation process. The present study is a cross informant design which involved 150 children…

Emotional Intelligence Primary shool children Teacher ratings
researchProduct

Effectiveness of nonlinear optical loop mirrors in chirped fiber gratings compensated dispersion-managed transmission systems

2005

International audience; We show that nonlinear optical loop mirrors can dramatically suppress the side peaks induced by the group delay ripples in chirped fiber gratings compensated dispersion-managed systems and significantly improve the system performance.

Fiber gratingsMaterials sciencegenetic structuresbusiness.industryNonlinear optics02 engineering and technologyTransmission system01 natural sciences010309 opticsLoop (topology)[CHIM.THEO]Chemical Sciences/Theoretical and/or physical chemistryNonlinear optical020210 optoelectronics & photonicsOptics0103 physical sciences[ CHIM.THEO ] Chemical Sciences/Theoretical and/or physical chemistry0202 electrical engineering electronic engineering information engineeringOptoelectronicsDispersion managedbusinessDiffraction gratingGroup delay and phase delay
researchProduct

Tuning And Chirping Fiber Bragg Gratings By A Magnetic Field

2005

Fiber gratingsOpticsMaterials scienceFiber Bragg gratingbusiness.industryChirpbusinessMagnetic fieldCLEO '97., Summaries of Papers Presented at the Conference on Lasers and Electro-Optics
researchProduct

H-KPP : Hypervisor-Assisted Kernel Patch Protection

2022

We present H-KPP, hypervisor-based protection for kernel code and data structures. H-KPP prevents the execution of unauthorized code in kernel mode. In addition, H-KPP protects certain object fields from malicious modifications. H-KPP can protect modern kernels equipped with BPF facilities and loadable kernel modules. H-KPP does not require modifying or recompiling the kernel. Unlike many other systems, H-KPP is based on a thin hypervisor and includes a novel SLAT switching mechanism, which allows H-KPP to achieve very low (≈6%) performance overhead compared to baseline Linux.

Fluid Flow and Transfer ProcessesSoftware_OPERATINGSYSTEMSvirtualisointiProcess Chemistry and TechnologyKernel IntegrityGeneral Engineeringvirtualization; Kernel Integrity; DKOMGeneral Materials SciencetietoturvaDKOMInstrumentationvirtualizationComputer Science Applications
researchProduct

Nanovised Control Flow Attestation

2022

This paper presents an improvement of control flow attestation (C-FLAT) for Linux. C-FLAT is a control attestation system for embedded devices. It was implemented as a software executing in ARM’s TrustZone on bare-metal devices. We extend the design and implementation of C-FLAT through the use of a type 2 Nanovisor in the Linux operating system. We call our improved system “C-FLAT Linux”. Compared to the original C-FLAT, C-FLAT Linux reduces processing overheads and is able to detect the SlowLoris attack. We describe the architecture of C-FLAT Linux and provide extensive measurements of its performance in benchmarks and real-world scenarios. In addition, we demonstrate the…

Fluid Flow and Transfer ProcessespääsynvalvontaSoftware_OPERATINGSYSTEMSvirtualisointiProcess Chemistry and TechnologyLinuxhypervisor; ARM; Linux; control flow; SlowLoris; TrustZoneSlowLorisGeneral EngineeringTrustZonecontrol flowComputer Science ApplicationsARMGeneral Materials SciencehypervisortietoturvaInstrumentationApplied Sciences; Volume 12; Issue 5; Pages: 2669
researchProduct