摘要 :
MicroFab Background. Project Introduction. Big Picture: Medical Devices. Packaging for Medical Electronics. Two Key Areas: Sensors & Drug Delivery.
摘要 :
MicroFab Background. Project Introduction. Big Picture: Medical Devices. Packaging for Medical Electronics. Two Key Areas: Sensors & Drug Delivery.
摘要 :
The stack is a critical memory structure to ensure the correct execution of programs because control flow changes through the data stored in it, such as return addresses and function pointers. Thus the stack has been a popular tar...
展开
The stack is a critical memory structure to ensure the correct execution of programs because control flow changes through the data stored in it, such as return addresses and function pointers. Thus the stack has been a popular target by many attacks and exploits like stack smashing attacks and return-oriented programming (ROP). We present a novel system to detect the corruption of the stack layout using a robust stack unwinding technique and detailed stack layouts extracted from the stack unwinding information for exception handling widely available in off-the-shelf binaries. Our evaluation with real-world ROP exploits has demonstrated successful detection of them with performance overhead of only 3.93% on average transparently without accessing any source code or debugging symbols of a protected binary.
收起
摘要 :
Leveraging the recent research interest in emerging economies, this Perspective paper argues that an institution-based view of international business (IB) strategy has emerged. It is positioned as one leg which helps sustain the “...
展开
Leveraging the recent research interest in emerging economies, this Perspective paper argues that an institution-based view of international business (IB) strategy has emerged. It is positioned as one leg which helps sustain the “strategy tripod” (the other two legs consisting of the industry- and resource-based views). We then review four diverse areas of substantive research: (1) antidumping as entry barriers, (2) competing in and out of India, (3) growing the firm in China, and (4) governing the corporation in emerging economies. Overall, we argue that an institution-based view of IB strategy, in combination with industry- and resource-based views, will not only help sustain a strategy tripod, but will also shed significant light on the most fundamental questions confronting IB, such as “What drives firm strategy and performance in IB?.”
收起
摘要 :
Fully Homomorphic Encryption schemes (FHEs) and Functional Encryption schemes (FUNCTEs) have a tremendousimpact in cryptography both for the natural questions that they address and for the wide range of applications in which they ...
展开
Fully Homomorphic Encryption schemes (FHEs) and Functional Encryption schemes (FUNCTEs) have a tremendousimpact in cryptography both for the natural questions that they address and for the wide range of applications in which they have been (sometimes critically) used. In this work we put forth the notion of a Controllable Homomorphic Encryption scheme (CHES), a new primitive that includes features of both FHEs and FUNCTEs. In a CHES it is possible (similarly to a FHE) to homomorphically evaluate a ciphertext Ct = Enc(m) and a circuit C therefore obtaining Enc(C(m)) but only if (similarly to a FUNCTE) a token for C has been received from the owner of the secret key. We discuss difficulties in constructing a CHES and then show a construction based on any FUNCTE. As a byproduct our CHES also represents a FUNCTE supporting the re-encryption functionality and in that respect improves existing solutions.
收起
摘要 :
1. More incompatibility, assembly, and conversion than desired 2. Operational voltages, drive currents 3. Temperature constraints (1) Substrate temperature limits (2) Materials - temperature limits (3) Inline process → speed is d...
展开
1. More incompatibility, assembly, and conversion than desired 2. Operational voltages, drive currents 3. Temperature constraints (1) Substrate temperature limits (2) Materials - temperature limits (3) Inline process → speed is determined by the slowest step 4. Materials constraints (1) May not be able to print all materials on the same substrate (2) Solvents may attack deposited materials 5. Flexibility constraints (1) Hybrid circuits → once a non-flexible die is attached limited flexibility 6. Wide variety of products → infinitely flexible system does not exist.
收起
摘要 :
1. More incompatibility, assembly, and conversion than desired 2. Operational voltages, drive currents 3. Temperature constraints (1) Substrate temperature limits (2) Materials - temperature limits (3) Inline process → speed is d...
展开
1. More incompatibility, assembly, and conversion than desired 2. Operational voltages, drive currents 3. Temperature constraints (1) Substrate temperature limits (2) Materials - temperature limits (3) Inline process → speed is determined by the slowest step 4. Materials constraints (1) May not be able to print all materials on the same substrate (2) Solvents may attack deposited materials 5. Flexibility constraints (1) Hybrid circuits → once a non-flexible die is attached limited flexibility 6. Wide variety of products → infinitely flexible system does not exist.
收起
摘要 :
A software update is a critical but complicated part of software security. Its delay poses risks due to vulnerabilities and defects of software. Despite the high demand to shorten the update lag and keep the software up-to-date, s...
展开
A software update is a critical but complicated part of software security. Its delay poses risks due to vulnerabilities and defects of software. Despite the high demand to shorten the update lag and keep the software up-to-date, software updates involve factors such as human behavior, program configurations, and system policies, adding variety in the updates of software. Investigating these factors in a real environment poses significant challenges such as the knowledge of software release schedules from the software vendors and the deployment times of programs in each user's machine. Obtaining software release plans requires information from vendors which is not typically available to public. On the users' side, tracking each software's exact update installation is required to determine the accurate update delay. Currently, a scalable and systematic approach is missing to analyze these two sides' views of a comprehensive set of software. We performed a long term system-wide study of update behavior for all software running in an enterprise by translating the operating system logs from enterprise machines into graphs of binary executable updates showing their complex, and individualized updates in the environment. Our comparative analysis locates risky machines and software with belated or dormant updates falling behind others within an enterprise without relying on any third-party or domain knowledge, providing new observations and opportunities for improvement of software updates. Our evaluation analyzes real data from 113,675 unique programs used by 774 computers over 3 years.
收起
摘要 :
Many emerging economies recently have launched ambitious efforts to privatize their stateowned enterprises (SOEs). However, most studies tend to view privatization as one homogenous mode of ownership transfer and do not investigat...
展开
Many emerging economies recently have launched ambitious efforts to privatize their stateowned enterprises (SOEs). However, most studies tend to view privatization as one homogenous mode of ownership transfer and do not investigate the implications of different modes of privatization. In this study, we recognize different privatization modes in emerging economies, namely, managerial contract, state-private alliance and SOE divestiture and discuss these privatization modes on aspects of firm adaptive capacity. We also recognize private entity’s participation and level of institutional development as sources of adaptive pressure for the government and the private entities. We propose that a fit between the adaptive capacity of a privatization mode and the pressure towards adaptation inside and outside the organization increases the likelihood of survival of privatization projects. Using data on private participation in infrastructure in emerging economies, we show that firms self-select privatization modes and survival differences across modes of privatization arise as a function of private entities’ participation and countries’ institutional development.
收起
摘要 :
In electronic anonymity markets a taker seeks a specified number of market makers in order to anonymize a transaction or activity. This process requires both coalition formation, in order to create an anonymity set among the taker...
展开
In electronic anonymity markets a taker seeks a specified number of market makers in order to anonymize a transaction or activity. This process requires both coalition formation, in order to create an anonymity set among the taker and makers, and the derivation of the fee that the taker pays each maker. The process has a novel property in that the taker pays for anonymity but anonymity is created for both the taker and the makers. Using the Shapley value for nontransferable utility cooperative games, we characterize the formation of the anonymity set and the fee for any arbitrary number of makers selected by the taker.
收起