• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 51
  • 9
  • 8
  • 7
  • 6
  • 5
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 118
  • 25
  • 24
  • 24
  • 24
  • 24
  • 17
  • 16
  • 15
  • 13
  • 11
  • 10
  • 10
  • 10
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Ensuring Trust Of Third-Party Hardware Design With Constrained Sequential Equivalence Checking

Shrestha, Gyanendra 25 October 2012 (has links)
Globalization of semiconductor design and manufacturing has led to a concern of trust in the final product. The components may now be designed and manufactured from anywhere in the world without the direct supervision of the buyer. As a result, the hardware designs and fabricated chips may be vulnerable to malicious alterations by an adversary at any stage of VLSI design flow, thus compromising the integrity of the component. The effect of any modifications made by the adversary can be catastrophic in the critical applications. Because of the stealthy nature of such insertions, it is extremely difficult to detect them using traditional testing and verification methods. Therefore, the trust of the hardware systems require a new approach and have drawn much attention in the hardware security community. For many years, the researchers have developed sophisticated techniques to detect, isolate and prevent malicious attacks in cyber security community assuming that the underlying hardware platform is extremely secure and trustworthy. But the hardware may contain one or more backdoors that can be exploited by software at the time of operation. Therefore, the trust of the computing system cannot be guaranteed unless we can guarantee the trust of the hardware platform. A malicious insertion can be very stealthy and may only involve minor modification in the hardware design or the fabricated chip. The insertion may require rare or specific conditions in order to be activated. The effect may be denial of service, change of function, destruction of chip, leakage of secret information from cryptographic hardware etc. In this thesis, we propose a novel technique for the detection of malicious alteration(s) in a third party soft intellectual property (IP) using a clever combination of sequential equivalence checking (SEC) and automatic test generation. The use of powerful inductive invariants can prune a large illegal state space, and test generation helps to provide a sensitization path for nodes of interest. Results for a set of hard-to-verify designs show that our method can either ensure that the suspect design is free from the functional effect of any malicious change(s) or return a small group of most likely malicious signals. / Master of Science
12

An educational theatre director's approach to Euripides' The Trojan women

Gross, Paula Elizabeth, 1937- January 1959 (has links)
No description available.
13

Der Troia-Mythos Rezeption und Transformation in epischen Geschichtsdarstellungen der Antike /

Jahn, Stefanie. January 2007 (has links)
Originally presented as the author's Thesis (doctoral - Düsseldorf)--under the title: Aeternaque Pergama servas. / Includes bibliographical references (p. [205]-230).
14

Jacques Milet's drama, "La destruction de Troye la grant" its principal source; its dramatic structure.

Oliver, Thomas Edward, January 1899 (has links)
Inaug.-diss.-Heidelberg. / Vita.
15

Der Troia-Mythos Rezeption und Transformation in epischen Geschichtsdarstellungen der Antike /

Jahn, Stefanie. January 2007 (has links)
Originally presented as the author's Thesis (doctoral - Düsseldorf)--under the title: Aeternaque Pergama servas. / Includes bibliographical references (p. [205]-230).
16

Estudo sobre hardware trojans e suas ameaças à Administração Pública Federal

Bruzzeguez, Gustavo Andrade 16 December 2017 (has links)
Dissertação (mestrado)—Universidade de Brasília, Instituto de Ciências Exatas, Departamento de Ciência da Computação, 2017. / Submitted by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-23T16:36:11Z No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5) / Approved for entry into archive by Raquel Viana (raquelviana@bce.unb.br) on 2018-07-24T19:35:27Z (GMT) No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5) / Made available in DSpace on 2018-07-24T19:35:27Z (GMT). No. of bitstreams: 1 2017_GustavoAndradeBruzzeguez.pdf: 2394160 bytes, checksum: c28f3f1d732b548a557f1a9cc46f87d8 (MD5) Previous issue date: 2018-07-23 / Nos últimos anos, pesquisadores vêm demonstrando a possibilidade de implementação de códigos maliciosos em circuitos integrados durante a fabricação destes dispositivos. A ameaça, que ficou conhecida como hardware trojan, vem atraindo a atenção dos governos e da indústria, dado que potencialmente envolve questões de espionagem e guerra cibernética. Diversos estudos vem sendo desenvolvidos na comunidade acadêmica mundial, em particular nos últimos 5 anos, conforme se constatou no levantamento bibliográfico com uso do enfoque meta-analítico. Não obstante, no Brasil, pouco se tem falado sobre o tema. Recentemente, o Gabinete de Segurança Institucional da Presidência da República publicou a Estratégia de Segurança da Informação e Comunicações e de Segurança Cibernética da Administração Pública Federal 2015-2018, o que demonstra a vontade do Estado brasileiro em equacionar os problemas afetos à área cibernética, por meio do planejamento e da coordenação de esforços dos órgãos públicos, em parceria com a sociedade. Trabalhando a partir dos Objetivos Estratégicos declarados nessa Estratégia, e utilizando-se de conceitos do Balanced Scorecard e da metodologia 5W2H, o trabalho propôs desdobramentos, no nível tático, de tais Objetivos, de forma que a Estratégia possa também abordar as questões associadas à ameaça do hardware Trojan. Não obstante os avanços notados na área cibernética, observa-se que o país encontra-se vulnerável à ameaça do hardware Trojan, seja pela incapacidade de detecção da ameaça, seja pela ausência de ações governamentais focando especificamente o problema. / In recent years, researchers have been demonstrating the possibility of malicious code being introduced into integrated circuits during the fabrication of these devices. The threat, which has become known as hardware Trojan, has attracted the attention of governments and industry as it potentially involves espionage and cyber warfare issues. Several studies have been developed in the world academic community, in particular in the last 5 years, as was verified in the bibliographical survey using the meta-analytic approach. Nevertheless, in Brazil, little has been said about the subject. Recently, the Office of Institutional Security of the brazilian Presidency of the Republic has published the Strategy for Information Security and Cybersecurity of the Federal Public Administration 2015-2018, which demonstrates the Brazilian State’s willingness to address the problems to the cybernetic area, through the planning and coordination of efforts of public agencies, in partnership with society. Working from the Strategic Objectives stated in this Strategy, and using concepts from the Balanced Scorecard and the 5W2H methodology, the work proposed a tactical level development of these Objectives, so that the Strategy could also address issues associated with the hardware Trojan threat. Despite the notable advances in the area of cybernetics, it’s noted that the country is vulnerable to the threat of hardware Trojan, either by the inability to detect the threat or by the absence of government actions specifically focusing on the problem.
17

Malwares brasileiros: técnicas, alvos e tendências

ARCOVERDE, Henrique Ferraz 08 August 2013 (has links)
Submitted by João Arthur Martins (joao.arthur@ufpe.br) on 2015-03-10T18:59:10Z No. of bitstreams: 2 Dissertacao Henrique Arcoverde.pdf: 3082942 bytes, checksum: ef1660c240d4704b1b59d9fcdb6ae063 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) / Approved for entry into archive by Daniella Sodre (daniella.sodre@ufpe.br) on 2015-03-10T19:42:10Z (GMT) No. of bitstreams: 2 Dissertacao Henrique Arcoverde.pdf: 3082942 bytes, checksum: ef1660c240d4704b1b59d9fcdb6ae063 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) / Made available in DSpace on 2015-03-10T19:42:11Z (GMT). No. of bitstreams: 2 Dissertacao Henrique Arcoverde.pdf: 3082942 bytes, checksum: ef1660c240d4704b1b59d9fcdb6ae063 (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Previous issue date: 2013-08-08 / Diante de uma sociedade que cada vez mais se alicerça em atividades digitais, é notória a disponibilização de serviços, outrora presentes quase que exclusivamente através de uma interface física, em meio digital. Como exemplo de tais serviços, podemos verificar; internet banking, e-mail, sites de relacionamento, financeiras, corretoras, etc. Todavia, tal qual vemos o crescimento dos serviços online, podemos verificar a migração de atividades criminosas do meio físico para o meio digital. É perante os ingentes números que reportam o volume de fraudes relacionadas ao meio digital, que urge a necessidade de conhecer as ameaças responsáveis por tais infortúnios. Dentre tais números, temos um grande percentual relacionados aos softwares deliberadamente programados para agirem de forma maliciosa, são os malwares. Sob tais considerações, associado ao alto nível de atividade das ameaças brasileiras, o presente trabalho pretende expor, através da análise de artefatos maliciosos brasileiros, as principais técnicas utilizadas pelos malwares brasileiros, quais as suas tendências e alvos. As referidas informações são essenciais para a compreensão global da ameaça, bem como para desenvolver mecanismos que permitam minimizar as perdas relativas a artefatos maliciosos.
18

De Ilii Coloribus: A Photometric Study of the Largest Jupiter Trojan Asteroids

Chatelain, Joseph 08 August 2017 (has links)
The Jupiter Trojan asteroids are minor bodies that orbit 60 degrees before and 60 degrees behind Jupiter. Because these orbits are stable over the lifetime of the Solar System, the properties of these objects may inform us about the conditions under which the Solar System formed. We present BVRI photometry for 110 of the intrinsically brightest and presumably largest members of the L4 and L5 Jupiter Trojans. We use a new principal color component derived by Chatelain et al. (2016) that is indicative of taxonomic types relevant to the Jupiter Trojan asteroids. We find that 83% of the largest Jupiter Trojans are consistent with a D-type classification, while 17% show shallower slopes more consistent with X-type and C-type classifications. We show the L4 and L5 populations to be taxonomically indistinguishable at large sizes, as well as include findings about certain objects that have resulted from these data. Specifically, multi-filter light curves for twelve objects show signs of V-I color variation in as many as two thirds of these objects, and our richest datasets allow for the determination of phase curves and shapes for some asteroids including a new shape model and pole solution for (1173) Anchises. Our goal is to use this study to shed light on these fascinating objects and to place the Trojans in context in the larger Solar System.
19

Towards Trojan Detection from a Raw Bitstream

Simpson, Corey Ryan 23 March 2022 (has links)
Many avenues exist to insert malicious circuitry into an FPGA designs, including compromised CAD tools, overwriting bitstream files, and post-deployment attacks. The proprietary nature of the Xilinx bitstreams precludes the ability to validate an implemented design. This thesis introduces the BitRec and IPRec projects in an effort to support trojan detection tools. BitRec provides a novel approach to mapping of the Xilinx bitstream format into FPGA features in order to recreate the original design's netlist. BitRec supports the 7 Series, UltraScale and UltraScale+ architectures. IPRec then provides a novel approach to recognizing parameterizable IP within a flattened netlist in an effort to eliminate large sections of trusted circuitry from needing to be analyzed by a trojan detection tool.
20

Botulinum Neurotoxin: Progress in Negating Its Neurotoxicity; And in Extending Its Therapeutic Utility via Molecular Engineering. Minireview

Kostrzewa, Richard M., Kostrzewa, Rose Anna, Kostrzewa, John P. 13 March 2015 (has links)
While the poisonous effects of botulinum neurotoxin (BoNT) have been recognized since antiquity, the overall actions and mechanisms of effects of BoNT have been elucidated primarily over the past several decades. The general utility of BoNT is described in the paper, but the focus is mainly on the approaches towards negating the toxic effects of BoNT, and on the projection of an engineered BoNT molecule serving as a Trojan Horse to deliver a therapeutic load for treatment of a host of medical disorders. The BoNT molecule is configured with a binding domain, a zinc-dependent protease with specificity primarily for vesicular proteins, and a translocation domain for delivery of the metalloprotease into the cytoplasm. The anti-toxin approaches for BoNT include the use of vaccines, antibodies, block of BoNT binding or translocation, inhibition of metalloprotease activity, impeded translocation of the protease/catalytic domain, and inhibition of the downstream Src signaling pathway. Projections of BoNT as a therapeutic include its targeting to non-cholinergic nerves, also targeting to non-neuronal cells for treatment of hypersecretory disorders (e.g., cystic fibrosis), and treatment of hormonal disorders (e.g., acromegaly). Still in the exploratory phase, there is the expectation of major advances in BoNT neuroprotective strategies and burgeoning utility of engineered BoNTs as therapeutics.

Page generated in 0.033 seconds