ESIEAEcole Supérieure d'Informatique Electronique Automatique (French computer/software engineering school)
Copyright 1988-2018, All rights reserved.
References in periodicals archive ?
(1) New Technologies Plate-Forme and (2) Physical Medicine and Rehabilitation Department, AP-HP, Raymond Poincare Teaching Hospital, Garches, France; (3) EA 4497 and Technological Innovations Centre (Inserm U 805), Versailles St-Quentin-en-Yvelines University, Garches, France; (4) Computer Lab, Frangois Rabelais University, Tours & Lab-STICC, CNRS, Lorient, France; (5) In Vienetis Inc, Paris, France; (6) IN'TECH INFO, ESIEA, Ivry sur Seine, France; (7) Physiology-Functional Testing Ward, AP-HP, Raymond Poincare Teaching Hospital, Garches, France
Now research out of Frances Ecole Superiore d'Informatique, Electronique, Automatique (ESIEA) moves a step closer to that goal: identifying a method for isolating the processor used by anonymous systems for the purpose of subverting that hardware.
A post on the blog of MIT's Technology Review, notes this recent paper by Anthony Desnos, Robert Erra and Eric Filiol of ESIEA. The research tackles a foundational problem for anyone looking to target attacks at processors: figuring out which processor a particular system is using.