Computer Sciences

New exploitation techniques and defenses for DOP attacks

Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...

Hi Tech & Innovation

Microsoft launches preview of its Quantum Development Kit

(Tech Xplore)—Microsoft has officially released a free preview of its Quantum Development Kit (QDK)—a collection of tools that will allow users to create, compile and run programs written in the Q# (pronounced Q sharp, ...

Hardware

LVI: Intel processors still vulnerable to attack, study finds

Computer scientists at KU Leuven have once again exposed a security flaw in Intel processors. Jo Van Bulck, Frank Piessens, and their colleagues in Austria, the United States, and Australia gave the manufacturer one year's ...

Computer Sciences

Gamalon technology accelerates machine learning

(Tech Xplore)—This AI launch could signal a difference for the better. Cambridge, MA-based Gamalon is touting its approach to AI and machine learning and the claims are significant. To start, add this to your mountain of ...

Computer Sciences

Designing unmanned aerial vehicle trajectories for energy minimization

A team of researchers at the University of Luxembourg and the Ontario Tech University have recently proposed a new approach to design trajectories for energy-efficient unmanned aerial vehicle (UAV)-enabled wireless communications. ...

Robotics

Humanoid service robot is showcased in Berlin

(Tech Xplore)—Off in the not so distant future one can hear the march of the humanoid robots, ready to lend an everyday presence in many retail shops and home services. Qihan is a company that's making some noise in that ...

page 2 from 9