blue pill
Recently Published Documents


TOTAL DOCUMENTS

36
(FIVE YEARS 6)

H-INDEX

3
(FIVE YEARS 1)

Author(s):  
Seyed Mohammad Aghamirmohammadali ◽  
Behnam Momeni ◽  
Solmaz Salimi ◽  
Mehdi Kharrazi
Keyword(s):  

2020 ◽  
Vol 1 (3) ◽  
pp. 81-90
Author(s):  
Friska Tiara Desy ◽  
◽  
Arif Surtono ◽  
Amir Supriyanto ◽  
Junaidi Junaidi ◽  
...  

The research about a design of prototype automatic pineapple sorting has been done with a belt conveyor system using a Blue Pill STM32F103C8T6 microcontroller. This research was conducted to create a prototype that can sort pineapples based on maturity level by classified unripe, ripe, and fully ripe. Sorting pineapple against the pineapple ripeness classification was carried out by a simulation process using serial data of index maturity sent from the PC monitor serial to microcontroller via serial communication. The serial data sent in character format was an integer 1; 2; 3; 4; 5; 6; and 7. The conveyor using a chain with gear transmission system and a DC motor as a drive. The results showed that the instument is capable of carrying a maximum load of pineapple fruit of 1.0 kg with a transport speed of 27,98 cm/s and can perform pineapple ripeness sorting with an accuracy more than 90%.


2020 ◽  
Vol 34 (S1) ◽  
pp. 1-1
Author(s):  
Justin La Favor ◽  
Matthew DeYong ◽  
Dan Berkowitz ◽  
Trinity Bivalacqua ◽  
Arthur Burnett

Author(s):  
Asaf Algawi ◽  
Michael Kiperberg ◽  
Roee Shimon Leon ◽  
Amit Resh ◽  
Nezer Jacob Zaidenberg

This article presents the concept of blue pill, a stealth hypervisor-based rootkit, that was introduced by Joanna Rutkowska in 2006. The blue pill is a malicious thin hypervisor-based rootkit that takes control of the victim machine. Furthermore, as the blue pill does not run under the operating system context, the blue pill is very difficult to detect easily. The red pill is the competing concept (i.e., a forensics software that runs on the inspected machine and detects the existence of malicious hypervisor or blue pill). The concept of attestation of a host ensuring that no hypervisor is running was first introduced by Kennel and Jamieson in 2002. Modern advances in hypervisor technology and hardware-assisted virtualization enables more stealth and detection methods. This article presents all the recent innovation in stealth blue pills and forensics red pills.


2015 ◽  
Vol 26 (6) ◽  
pp. 76-76
Author(s):  
Dwayne Godwin ◽  
Jorge Cham
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document