4,201 research outputs found

    Spartan Daily, January 9, 1953

    Get PDF
    Volume 41, Issue 64https://scholarworks.sjsu.edu/spartandaily/11812/thumbnail.jp

    Run Me a River

    Get PDF
    The rich history of river life in Kentucky permeates Janice Holt Giles’s novel Run Me a River. Set in 1861, at the beginning of Kentucky’s reluctant entry into the Civil War, the novel tells the story of a five-day adventure on the Green River. Aboard the Rambler, a ramshackle steamboat, Captain Bohannon Cartwright and his crew journey 184 miles and pick up two extra passengers along the way. The boatmen rescue “Sir Henry” Cole, a former Shakespearean actor, and his granddaughter Phoebe from their skiff when it overruns in a squall. As romance blossoms between Phoebe and Captain Bo, a conflict escalates between Confederate and Union forces fighting for control of the river. Janice Holt Giles (1905-1979), author of nineteen books, lived and wrote near Knifley, Kentucky, for thirty-four years. Her biography is told in Janice Holt Giles: A Writer\u27s Life.https://uknowledge.uky.edu/upk_english_language_and_literature_north_america/1066/thumbnail.jp

    Cross-core Microarchitectural Attacks and Countermeasures

    Get PDF
    In the last decade, multi-threaded systems and resource sharing have brought a number of technologies that facilitate our daily tasks in a way we never imagined. Among others, cloud computing has emerged to offer us powerful computational resources without having to physically acquire and install them, while smartphones have almost acquired the same importance desktop computers had a decade ago. This has only been possible thanks to the ever evolving performance optimization improvements made to modern microarchitectures that efficiently manage concurrent usage of hardware resources. One of the aforementioned optimizations is the usage of shared Last Level Caches (LLCs) to balance different CPU core loads and to maintain coherency between shared memory blocks utilized by different cores. The latter for instance has enabled concurrent execution of several processes in low RAM devices such as smartphones. Although efficient hardware resource sharing has become the de-facto model for several modern technologies, it also poses a major concern with respect to security. Some of the concurrently executed co-resident processes might in fact be malicious and try to take advantage of hardware proximity. New technologies usually claim to be secure by implementing sandboxing techniques and executing processes in isolated software environments, called Virtual Machines (VMs). However, the design of these isolated environments aims at preventing pure software- based attacks and usually does not consider hardware leakages. In fact, the malicious utilization of hardware resources as covert channels might have severe consequences to the privacy of the customers. Our work demonstrates that malicious customers of such technologies can utilize the LLC as the covert channel to obtain sensitive information from a co-resident victim. We show that the LLC is an attractive resource to be targeted by attackers, as it offers high resolution and, unlike previous microarchitectural attacks, does not require core-colocation. Particularly concerning are the cases in which cryptography is compromised, as it is the main component of every security solution. In this sense, the presented work does not only introduce three attack variants that can be applicable in different scenarios, but also demonstrates the ability to recover cryptographic keys (e.g. AES and RSA) and TLS session messages across VMs, bypassing sandboxing techniques. Finally, two countermeasures to prevent microarchitectural attacks in general and LLC attacks in particular from retrieving fine- grain information are presented. Unlike previously proposed countermeasures, ours do not add permanent overheads in the system but can be utilized as preemptive defenses. The first identifies leakages in cryptographic software that can potentially lead to key extraction, and thus, can be utilized by cryptographic code designers to ensure the sanity of their libraries before deployment. The second detects microarchitectural attacks embedded into innocent-looking binaries, preventing them from being posted in official application repositories that usually have the full trust of the customer

    Spartan Daily, October 9, 1945

    Get PDF
    Volume 34, Issue 4https://scholarworks.sjsu.edu/spartandaily/3643/thumbnail.jp

    Something between us

    Get PDF
    Something Between Us is a comi-tragedy, a novel that deals with the relationships between a group of adolescent friends. Set in a small South African mining town in the 1980s, against a general backdrop of political upheaval and border conflict, it aims to explore the nature and consequences of these relationships within the context of a central incident, in which the novel's narration reveals some of the wider fracture lines in the South Africa that was, and the South Africa that is today. Something Between Us is also a satire, in the manner in which it treats the behaviours, attitudes and idiomatic turns of speech that would characterize a certain sector of white youth from this particular era. The intention of the novel is to reveal, albeit with a comic-serio touch, the ways in which South Africa's past, as refracted through young lives, continues to reach into the present

    The Cord Weekly (February 25, 1999)

    Get PDF

    Fugues : seven short stories

    Get PDF

    Shadow War

    Get PDF

    Volume 47 - Issue 13 - Friday, January 13, 2012

    Get PDF
    The Rose Thorn, Rose-Hulman\u27s independent student newspaper.https://scholar.rose-hulman.edu/rosethorn/1061/thumbnail.jp
    • …
    corecore