32,454 research outputs found
A Case Study in Matching Service Descriptions to Implementations in an Existing System
A number of companies are trying to migrate large monolithic software systems
to Service Oriented Architectures. A common approach to do this is to first
identify and describe desired services (i.e., create a model), and then to
locate portions of code within the existing system that implement the described
services. In this paper we describe a detailed case study we undertook to match
a model to an open-source business application. We describe the systematic
methodology we used, the results of the exercise, as well as several
observations that throw light on the nature of this problem. We also suggest
and validate heuristics that are likely to be useful in partially automating
the process of matching service descriptions to implementations.Comment: 20 pages, 19 pdf figure
Power Side Channels in Security ICs: Hardware Countermeasures
Power side-channel attacks are a very effective cryptanalysis technique that
can infer secret keys of security ICs by monitoring the power consumption.
Since the emergence of practical attacks in the late 90s, they have been a
major threat to many cryptographic-equipped devices including smart cards,
encrypted FPGA designs, and mobile phones. Designers and manufacturers of
cryptographic devices have in response developed various countermeasures for
protection. Attacking methods have also evolved to counteract resistant
implementations. This paper reviews foundational power analysis attack
techniques and examines a variety of hardware design mitigations. The aim is to
highlight exposed vulnerabilities in hardware-based countermeasures for future
more secure implementations
Towards realistic implementations of a Majorana surface code
Surface codes have emerged as promising candidates for quantum information
processing. Building on the previous idea to realize the physical qubits of
such systems in terms of Majorana bound states supported by topological
semiconductor nanowires, we show that the basic code operations, namely
projective stabilizer measurements and qubit manipulations, can be implemented
by conventional tunnel conductance probes and charge pumping via
single-electron transistors, respectively. The simplicity of the access scheme
suggests that a functional code might be in close experimental reach.Comment: 5 pages, 1 p. suppl.mat, PRL in pres
- …