120 Domain-Specific Languages for Security

M Krausz, S Peldszus, F Regazzoni, T Berger… - arxiv preprint arxiv …, 2024 - arxiv.org
Security engineering, from security requirements engineering to the implementation of
cryptographic protocols, is often supported by domain-specific languages (DSLs) …

Vulnerability Flow Type Systems

M Lesani - 2024 IEEE Security and Privacy Workshops (SPW), 2024 - ieeexplore.ieee.org
Pervasive and critical software systems have dormant vulnerabilities that attackers can
trigger and cascade to make the program act as a weird machine. In fact, they harbor …

Heterogeneous Byzantine Replicated Systems

X Li - 2024 - search.proquest.com
Since the advent of Byzantine replicated systems such as PBFT, numerous follow-up
variants can maintain consistent replications in the presence of malicious nodes. However …

FPGA-Based Acceleration: From Cloud to Edge

A Kalantar Chahouki - 2023 - escholarship.org
Increasingly, FPGAs have shown promise of high processing power in various fields such as
machine learning, computer vision, high frequency trading, and others thanks to their basic …

[BOG][B] FPGA-Based Acceleration: From Cloud to Edge

AK Chahouki - 2023 - search.proquest.com
Increasingly, FPGAs have shown promise of high processing power in various fields such as
machine learning, computer vision, high frequency trading, and others thanks to their basic …