Search results for "operating system"
showing 10 items of 134 documents
Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot
2020
Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.
Efficient Protection for VDI Workstations
2019
Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…
Smear layer removal evaluation of different protocol of Bio Race file and XP- endo Finisher file in corporation with EDTA 17% and NaOCl.
2017
Background The aim of the present study was to compare the amount of the smear layer remaining in prepared root canals with different protocols of Bio RaCe files and XP-endo Finisher file (XPF) in association with 17% EDTA and sodium hypochlorite solution. Material and Methods A total of 68 extracted single-rooted teeth were randomly divided into 4 experimental groups (n=14) and two control groups (n=6). The root canals were prepared with Bio RaCe files (FKG Dentaire, Switzerland) using the crown-down technique based on manufacturer's instructions and irrigated according to the following irrigation techniques: Group 1: XPF with 2 mL of 2.5% NaOCl for 1 minute. Group 2:, XPF with 1 mL of 17%…
Arm Hypervisor and Trustzone Alternatives
2020
Many scenarios such as DRM, payments, and homeland security require a trusted and verified trusted execution environment (TEE) on ARM. In most cases such TEE should be available in source code mode. The vendor cannot conduct code review and ensure that the operating system is trustworthy unless source code is available. Android and other rich execution environments (REEs) support various TEE implementations. Each TEE implementation has its own unique way of deploying trusted applications and features. Most TEEs in ARM can be started at TrustZone™ or Hyp (Hypervisor) mode. Choosing a proper TEE operating system can be a problem for trusted application developers and hardware vendors. This ar…
Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection
2014
[EN] In the last years the number of malware Apps that the users download to their devices has risen. In this paper, we propose an agentbased model to quantify the Android malware infection evolution, modeling the behavior of the users and the different markets where the users may download Apps. The model predicts the number of infected smartphones depending on the type of malware. Additionally, we will estimate the cost that the users should afford when the malware is in their devices. We will be able to analyze which part is more critical: the users, giving indiscriminate permissions to the Apps or not protecting their devices with antivirus software, or the Android platform, due to the v…
MASK 2017: ARIA digitally-enabled, integrated, person-centred care for rhinitis and asthma multimorbidity using real-world-evidence
2018
mHealth, such as apps running on consumer smart devices is becoming increasingly popular and has the potential to profoundly affect healthcare and health outcomes. However, it may be disruptive and results achieved are not always reaching the goals. Allergic Rhinitis and its Impact on Asthma (ARIA) has evolved from a guideline using the best evidence-based approach to care pathways suited to real-life using mobile technology in allergic rhinitis (AR) and asthma multimorbidity. Patients largely use over-the-counter medications dispensed in pharmacies. Shared decision making centered around the patient and based on self-management should be the norm. Mobile Airways Sentinel networK (MASK), th…
<title>Real-time face tracking and recognition for video conferencing</title>
2001
This paper describes a system of vision in real time, allowing to detect automatically the faces presence, to localize and to follow them in video sequences. We verify also the faces identities. These processes are based by combining technique of image processing and methods of neural networks. The tracking is realized with a strategy of prediction-verification using the dynamic information of the detection. The system has been evaluated quantitatively on 8 video sequences. The robustness of the method has been tested on various lightings images. We present also the analysis of complexity of this algorithm in order to realize an implementation in real time on a FPGA based architecture.
Iterative sparse matrix-vector multiplication for accelerating the block Wiedemann algorithm over GF(2) on multi-graphics processing unit systems
2012
SUMMARY The block Wiedemann (BW) algorithm is frequently used to solve sparse linear systems over GF(2). Iterative sparse matrix–vector multiplication is the most time-consuming operation. The necessity to accelerate this step is motivated by the application of BW to very large matrices used in the linear algebra step of the number field sieve (NFS) for integer factorization. In this paper, we derive an efficient CUDA implementation of this operation by using a newly designed hybrid sparse matrix format. This leads to speedups between 4 and 8 on a single graphics processing unit (GPU) for a number of tested NFS matrices compared with an optimized multicore implementation. We further present…
Predictability, chaos and coordination in bird vigilant behaviour
1999
Revisiting Bicausative Matrices: The Swiss Cheese of Chaos
2009
This paper returns to de Mesnard's paper of 2000, which has exposed the so-called method of bicausative matrices. This method was created to analyze the structural change between two matrices, as an improvement of the causative method of Jackson and al. (1990). In its 2000 paper, de Mesnard has shown that chaos affects the bicausative method: two solutions are found with a brutal switching between both. This new paper demonstrates that the chaos can be largely circumvented, is essentially localized in a small interval and is only a transitory effect between two non-chaotic "regimes", is not always observed, is limited to relatively small matrices.