208 research outputs found

    A Survey of Techniques for Improving Security of GPUs

    Full text link
    Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest `link' in the security `chain'. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and differences. More than informing users and researchers about GPU security techniques, this survey aims to increase their awareness about GPU security vulnerabilities and potential countermeasures

    Online Payment Module

    Get PDF
    The aim of this project is to deploy the online payment service in Moodle. All the major debit, credit and international card (transactions) can be accepted for payment. Online payment module prepares a web server that takes all types of transactions. This module can be enabled by the site administrator. If it is enabled, students can pay for their classes through online transactions. Administrator can set an individual price for a course if needed. It allows the user to create their own account and add optional account links. This project is important to resolve the issues for students and administrators to have an easy glance at the course registration like selection of their courses, Fee details. This project makes it easy for students to look for the courses and register, one can check the site as a guest and can create his/her own account and can enroll for subjects. One can see the fee details for each course

    Security Issues in mGovernment

    Get PDF
    E-government is one of the most rapidly evolving service domains in the contemporary information society. Many governments have already developed and provided e-government services to businesses and citizens. Nowadays actors in the government domain attempt to take the next step and exploit the latest wireless technologies in order to provide ubiquitous services for mobile users. However, this approach involves some hidden risks mainly due to the inherent insecurity of the air medium and the vulnerabilities of the wireless systems. Thus, in this paper we investigate the security gaps and considerations which should be taken into account for an m-government system. Finally, we provide a list of security guidelines and policies, which the users of the system should be aware of and follow in order to avoid security attacks

    Biologically Inspired Mechanisms for Adversarial Robustness

    Full text link
    A convolutional neural network strongly robust to adversarial perturbations at reasonable computational and performance cost has not yet been demonstrated. The primate visual ventral stream seems to be robust to small perturbations in visual stimuli but the underlying mechanisms that give rise to this robust perception are not understood. In this work, we investigate the role of two biologically plausible mechanisms in adversarial robustness. We demonstrate that the non-uniform sampling performed by the primate retina and the presence of multiple receptive fields with a range of receptive field sizes at each eccentricity improve the robustness of neural networks to small adversarial perturbations. We verify that these two mechanisms do not suffer from gradient obfuscation and study their contribution to adversarial robustness through ablation studies.Comment: 25 pages, 15 figure
    corecore