Search Results - security

3 Results Sort By:
MemPoline: Protecting Sensitive Software against Memory-based Information Leakage
INV-21111 Background In recent years, various side-channel timing attacks on both CPUs and GPUs, in diverse settings such as desktops, clouds, and mobile systems have been seen. These attacks observe events on different shared resources on the memory hierarchy from timing information, and then infer memory access patterns to retrieve the secret...
Published: 1/27/2025   |   Updated: 3/21/2024   |   Inventor(s): Yunsi Fei, Zhen Jiang
Keywords(s): cryptographic engineering, Cyber Security, Security
Category(s): Technology Classifications > 3. Computer Science > Software, Technology Classifications > 3. Computer Science > IoT
Ultrasonics-based system for detection of metallic security threats containers on cargo
INV-15027 Description In prior-art, most security threat detection techniques/procedures use X-ray based detection systems. In general, X-rays are harmful and their prolonged exposure can have devastating effects. Moreover, X-ray based systems are not capable of providing information regarding thickness of the container as X-rays have limited...
Published: 1/27/2025   |   Updated: 3/21/2024   |   Inventor(s): Jose Angel Martinez-Lorenzo, Yuri Alvarez-Lopez
Keywords(s): Radiology/Imaging, Security
Category(s): -Homeland Security, Technology Classifications > 3. Computer Science > Imaging, Technology Classifications > 2. Physical Science > Security
On the move millimeter wave interrogation system with a hallway of multiple transmitters and receivers
INV-14050 Description The use of millimeter-wave imaging techniques/systems is well known in prior art. Current techniques/systems generally use portal configuration and/or monostatic radar technology. The images generated using such systems often have reconstructed artifacts, such as dihedral effects, misrepresenting sudden indentations and protrusions....
Published: 1/27/2025   |   Updated: 3/21/2024   |   Inventor(s): Carey Rappaport, Jose Angel Martinez-Lorenzo, Borja Gonzales Valdes
Keywords(s): Imaging, Security, Sensor Technology
Category(s): -Homeland Security, Technology Classifications > 3. Computer Science > Imaging
Copyright© Northeastern University. All rights reserved. Powered by Inteum.