![]() ![]() To verify that the subjects set the size of their attentional field appropriately, in half the trials the size of the stimulus did not change, and we observed that the saccadic latencies were short when subjects attended to the small ring and large when attending to the large ring, regardless of the time between size-change and stimulus-step. The subject's task was to identify the new number of segments, a task greatly facilitated by having attention at the appropriate spatial scale. At the time of the size-change, the number of segments briefly changed. The stimulus consisted of a rotating segmented ring either 1 or 4 deg in diameter. steps right or left by 2 deg whilst we record the latency of the saccades elicited. We now use this oculomotor difference to measure the time it takes for attention to change its spatial scale, by having a stimulus change in size at different times before or after it. We have shown that the latency of small saccades depends on the size of the attended object, being long for steps so small that the attended objects remain within the attentional window, and short for larger steps. A key focus of the work is the development of a hypervisor- based security architecture which utilizes a state-of-the- art hardware trust anchor to increase the security and trustworthiness of commonly used operating systems in the embedded x86 sector. ![]() In this paper we propose an efficient hardware-based security architecture utilizing Trusted Computing (TC) techniques based on trustworthy building blocks. Today's systems have a requirement for a high level of dependability, offering both safety and security features. To improve on this situation, it is necessary to anchor additional hardware- based security modules as an integral part of a platform. In addition attacks against IT systems are becoming more sophisticated and pure software-based solutions cannot guarantee lifetime integrity anymore. components to the well- established x86 architecture and to employ commonly used operating systems such as Windows or Linux. Furthermore, there is a movement in the embedded sector to shift away from pro- prietary software and hardware. ![]() By now the design flaws in hardware com- ponents, as well as software applications and operating systems, are well known and can easily be exploited if an injection vector is found. It is amazing how accustomed we have grown to the ubiquitous threats in our every day com- puting lives. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |