Redirigiendo al acceso original de articulo en 18 segundos...
ARTÍCULO
TITULO

Schönhage machines can be vulnerable

S. A. Zhucov    

Resumen

The article discusses an invasion model in the form of memory destruction of one type of abstract algorithm executor introduced by Schönhage. Two invasion scenarios are defined (attack without aftereffect and attack with aftereffect), and the macros proposed in the article are used to program variants of destroying the memory of this performer. It is shown that even the limited capabilities of the Schönhage machines (the attacker) make it possible to perform both partial and complete destruction of the memory of the attacked Schönhage machine (the victim). Destruction of memory is understood as its destructuring, in which access to some of its elements or all elements becomes impossible. However, for a certain class of Schönhage machines (machines with a regular memory structure), it is possible to detect their memory in order to establish the fact of its damage. The regularity of the memory structure is understood as the possibility of describing this structure by a graph grammar, which specifies a finite set of patterns of structures, replicated when constructing the generated graph in a way defined in the grammar. Examples of Schönhage machines are given, the memory structure of which is described by the grammars noted above. Sources of threats are not considered in this article. Only some forms of threats and the possibility of their implementation by means of Schönhage machines are being studied

 Artículos similares

       
 
J. Javier Samper-Zapater, Julián Gutiérrez-Moret, Jose Macario Rocha, Juan José Martinez-Durá and Vicente R. Tomás    
The significance of Linked Open Data datasets for traffic information extends beyond just including open traffic data. It incorporates links to other relevant thematic datasets available on the web. This enables federated queries across different data pl... ver más
Revista: Information

 
Elham Albaroudi, Taha Mansouri and Ali Alameer    
The study comprehensively reviews artificial intelligence (AI) techniques for addressing algorithmic bias in job hiring. More businesses are using AI in curriculum vitae (CV) screening. While the move improves efficiency in the recruitment process, it is... ver más
Revista: AI

 
Artur Chudzik and Andrzej W. Przybyszewski    
Neurodegenerative diseases (NDs), including Parkinson?s and Alzheimer?s disease, pose a significant challenge to global health, and early detection tools are crucial for effective intervention. The adaptation of online screening forms and machine learnin... ver más
Revista: Applied Sciences

 
Kwangseob Kim and Kiwon Lee    
This study introduces a multi-cloud model that combines private and public cloud services for processing and managing satellite images. The multi-cloud service is established by incorporating private clouds within organizations and integrating them with ... ver más
Revista: Applied Sciences

 
Vladimir Dmitrievskii, Vadim Kazakbaev and Vladimir Prakht    
Due to the high cost and the predicted shortage of rare earth elements in the near future, the task of developing energy-efficient electric machines without rare earth magnets is of great importance. This article presents a comparative analysis of optimi... ver más
Revista: Applied Sciences