26 research outputs found
Landscapes and Local Identity: the Eight Views of Linfen
This chapter is the first part of an exploration into the history and meaning of landscapes, based on a case study of the āmust-seeā scenic spots or Eight Views (bajing å
«ęÆ) of Linfen County in the south of China's Shanxi province. County histories not only include poems and travel accounts describing these places, but often also, from the 18th century onwards, images representing them. They are thus well-documented places, which makes it possible to trace fragments of their history and draw conclusions about the relationship between humans and their physical environment. This part of the study focuses on how the physical environment interlocked with the historical heritage of a place to form a cultural landscape that gave identity and meaning to a place and its people
Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware?
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural Attacks, the result of these vulnerabilities, take advantage of Microarchitectural performance of processor implementations, revealing hidden computing process. Leveraging Microarchitectural resources, adversaries can potentially launch Timing-Based Side-Channel Attacks in order to leak information via timing. In view of these security threats against computing hardware, we analyse current attacks that take advantage of Microarchitectural elements in shared computing hardware. Our analysis focuses only on Timing-Based Side-Channel Attacks against the components of modern PC platforms - with references being made also to other platforms when relevant - as opposed to any other variations of Side-Channel Attacks which have a broad application range. To this end, we analyse Timing Attacks performed against processor and cache components, again with references to other components when appropriate