HIRU FM LIVE



HIRU FM LIVE

HOT POSTS

Latest Video

Hiru News 7 - 10.04.2014
MTVsports Newsfirst 12.30PM News 10th April 2014
Live@12 News 10.04.2014
shakthi lunch time news 10th April 2014 1 00pm
ITN Noon News 10.04.2014
Aathma 72 - 10.04.2014
Waraamali 17 - 10.04.2014
Ranaa 24 - 10.04.2014
Sneha 49 - 10.04.2014
Swapna 188 - 10.04.2014 Svapna
Sanda Savi 145 - 10.04.2014
Muthu Palasa 223 - 10.04.2014
Chaya 242 - 10.04.2014
Punchi Walauva 21 - 10.04.2014
Hiru Thaniwela 339 - 10.04.2014
Aththamma 277 - 10.04.2014
Swarnapali 59 - 10.04.2014 Svarnapali
Pabasara 77 - 10.04.2014
Kolamba Ahasa 45 - 10.04.2014
Tharumali - 297 - 10.04.2014
Pura Kalani 03 - 10.04.201403 - 10.04.2014
Thurya 486 - 10.04.2014
Sihina Sakmana 34 - 10.04.2014
Reana 24 - 10.04.2014
Gini Awi Saha Gini Keli Episode 04- 10/04/2014
http://imagizer.imageshack.us/a/img534/6607/n662.jpg
Para Walalu 47 - 10.04.2014
Mulpituva 10.04.2014 Mulpituwa
Davase Paththara 10.04.2014
Lagna Palaa Pala 10-04-2014
8 Pass 09.04.2014
Pati Roll 08.04.2014
Hathdinnath Tharu 10.04.2014

Ads 468x60px

Featured Posts

Nadini Pramadasa  

kÈks wdmyq jev mgka wrka jf.a Tõ ug fojeks nnd ,efnkak ysgmq ksid'''' ix.S; lghq;=j,ska''' udi ;=kla‌ ú;r wE;afj,dfk ysáfh' oeka ÿjg

udi yhla‌ fjkj ta ksid mqreÿ úÈhg m%ix.j,g iyNd.s fjkjd' * ,efnk yeu m%ix.hla‌u ndr .kakjo@ tfyu ldf,l=;a ;snqKd fudlo wmsg wdrdOkd lrkafka wmsj ´k ksidfk' ta;a oeka tfyu lrkak nE' nnd, álla‌
f,dl= fjklï f;dar fír f.k ;uhs iyNd.s fjkafk' ÿr m<d;aj, ;sfhk m%ix.j,g iyNd.s fkdfjk ;rï'

 f;dard fírd .ekSu ksid ckm%sh;ajh wvqfjkjd fkao@ ug kï fmakafk tafl wks;a me;a;' fõÈldjg f.dvjqKdu tod ;snqK m%;spdrj,g jvd wo ,efnk m%;spdr jeähs' taflka fmakafk ckm%sh;ajh jeä fj,d lshk talfk'

 fï úÈhg ckm%sh;ajh r|j.kafka fldfyduo@ .dhsldjla‌ jqKd lsh,d ug ys;, ckm%sh fjkak nE' wfma .S; wyk ix.S; f,da,Skag riú¢kak mq¿jka úÈhg .S; .dhkh lsÍfuka ;uhs ckm%sh;ajh fËkafk'

 iqm¾ia‌gd¾ ;r.fha isg wo ola‌jd fndfyda fokdf. woyi Tn jvd;a iqÿiq ngysr .S .dhkhg lsh,hs' uf.a yඬ iqÿiq ngysr .S;j,g lsh, f.dv fofkla‌ ug;a lsh, ;sfhkjd' ug fyd|g ngysr .S; .dhkd lrkak;a mq¿jka' wksl uu ngysr ix.S;h yodr,;a ;sfhkjd' .S; bÈßm;a lrk ú,dYh iy fmkqu ta i|yd n,mdkjd we;s lsh,hs ug kï ysf;kafk'



 ngysr .S; .dhkh ;=<ska bÈßhg tkak woyila‌ kÈksg keoao@ tfyu f,dl= n,dfmdfrd;a;=jila‌ kE' bÈßfha§ ta .ek ys;, n,kjd'

 orejka fofofkl=f.a ujla‌ jQ Tn l,dlghq;= yd m%ix.j,g odhlùfuka hq;=lï j.lSï u. yefrkafka keoao@ tfyu fkdfjk úÈhg ;uhs uu yeufoau lrkafk' ojfia tl jrejla‌ l,d lghq;=j,g fjka lrkak isoaO jqfKd;a wks;ajrej wksjd¾hfhkau uu fjka lrkafk nnd, fokak fjkqfjka' wksl uf.a wïu ug f,dl= iyfhda.hla‌ ,nd fokjd orejkaf. jevj,g'

 .dhsldjla‌ úÈhg ieñhdf.ka ,efnk m%;spdr iy iyfhda.h fudkjf.ao@ uf.a isxÿ fyd|kï thd tal wf.a lr, udj Èßu;a lrkjd' wvqmdvqjla‌ ;sfhkjd kï taj;a fmkaj, fokjd' újdy fjÉp ojfia b|, m%ix.j,g udj tla‌l hkafk;a thdu ;uhs' ljodj;a ta foaj,a lrorhla‌ úÈhg i,lkafk kE fldÉpr ld¾h nyq, jqK;a'

 tod Tn bÈßm;a jQ iqm¾ia‌gd¾ ;r.h yd ii|oa§ wo ;r.j, .=Kd;aul nfõ wvqjla‌ olskjdo@ wms bÈßm;a jqfKa fï jevigykaj, uq,a ldf,a' ta ksid tajd yefudau Wkkaÿfjka kerUqjd' wmsg f.dvla‌ wh wdof¾ l<d' ;re f;dark ;r. wvq ksid f,dl= ckm%sh;ajhla‌ fï ;r.j,g ;snqKd' wo yeu kd,sldfju fujeks foaj,a ;sfhk ksid fïj;a idudkH jevigyka njg m;afj,d'

 Tn;a tla‌l ;r. lrmq hy¿ fhfy<shka iu. tod ;snqK in|lï wo;a ta úÈhuo wms yefudau oeka ld¾h nyq, ksid ks;r l;dny lrkak yuqfjkak ;sfhk bvlv wvqhs' ta;a Wjukdjla‌ jqK fj,djg wksjd¾hfhkau wms tl;= fjkjd'

 


 ieñhdf.a jHdmdrj,g iyfhda.h ola‌jkafka flfiao@ oekg kï ta foaj,aj,g f,dl= iyfhda.hla‌ fokak wudrehs' ta;a mq¿jka foaj,a lr, fokjd' thdf.a wïu ;d;a;d jHdmdr lghq;=j,g iïnkaO fj,d bkak ksid f,dl= .egÆjl=;a kE' ÿjhs mq;hs f,dl= jqKdg mia‌fi ta i|yd fhduq fjkjd'

 ßhE,sá jevigykaj, úksYaphg wdrdOkd ,efnkafka keoao@ tfyu wjia‌:d lSmhla‌ ,enqKd' ta;a ta ldf, ug mq;d ,efnkak ysgmq ksid iyNd.S fjkak ,enqfKa kE' yenehs rKúre ßh,a ia‌gd¾ ;=kajk wÈhf¾ ksfõok lghq;=j,g iïnkaO jqKd'

 rx.khg wjia‌:djla‌ ,enqfKd;a fudlo lrkafk' uf.a ola‍I;djh ;sfhkafk;a uu yeoErefj;a ix.S;h' b;ska isxÿjla‌ lshdf.k bkak tl ;uhs jeäh fyd| uu ys;k úÈhg' ta i|yd ,enqKq wjia‌:d ndr fkd.;a; jf.au bÈßhg ,efnk wjia‌:d;a fndfyda ÿrg ndr fkd.kSú'

 kÈksf. mqxÑ leoe,af,a f;dr;=re áll=;a lshkjo@ uf.a uy;a;hd uOqr wfíisxy jHdmdßlfhla‌' mq;d wd¾hkag oeka wjqreÿ 3 1$2 hs' fmr mdi,a hkjd' ÿj wd¾hdkdg ;du udi 6 hs' ta wefrkak b;ska ud,fí wfma f.org fj,d mdvqfõ Ôj;a fjkjd'






Researchers at New York University Abu Dhabi’s Design for Excellence lab have developed new innovations in computer chip technology that present landmark achievements in IT security.

Secured by a secret key so that only authorised users may utilise them, and immune to reverse-engineering, ‘logic-locked’ computer chips will provide future users with new guarantees of security for their devices.

As IT security rises to the forefront of public concern in the wake of recent cyber security attacks such as the WannaCry and Petya/NotPetya ransomware, academic solutions have been investigated in order to secure future systems from hackers.

With any electronic device claiming to be "smart" containing a chip, from cell phones and computers to airplanes and medical devices, chip security has become a subject of priority amid the broadening debate surrounding measures for cyber defence.

"Traditionally, security features are implemented at the software or system levels. For the first time, we have security implemented at the lowest possible level, the hardware level.

This is quite important because if the hardware is compromised, there is no software or system security fix," explained NYUAD Associate Dean of Engineering for Academic Affairs, Associate Professor of Electrical and Computer Engineering, and Head of Design for Excellence, Dfx, Ozgur Sinanoglu.

"This chip can be unlocked only by loading the secret binary key on its memory. Without it, the chip will not work. Only when the secret key has been loaded will the microprocessor unit inside execute the program loaded on its memory," he added.

NYUAD’s Dfx research team designed two different chips over the past year, utilising commercial and in-house developed software tools to help them build a baseline chip as well as their logic-locked chip. These are microcontroller chips with mainly an ARM microprocessor unit, which allow you to load a software program onto their memory, which they may then execute, allowing users to design a computational system or computer around them.

The team at NYUAD are now pursuing a platform that will enable the research community to validate the security of their new solution through extensive red-team blue-team testing.

"Through their research at NYUAD, the Dfx team have surged ahead in the field of solution development for IT security," Sinanoglu explained, saying, "The industry is slowly developing solutions, but they are early solutions that are not as of yet so secure.

Academia is quite ahead in the game, with various research groups working on this area. Our solution is the first one that is provably secure, based on mathematical security definitions and security proofs as well as implemented on a real chip."

"Our goal is to make all electronics truly trustworthy. We are now in a position where we can take any chip design and transform it into one that is secure at the hardware level, which means we can work with design companies to help them produce protected computer chips," Sinanoglu added.

The paper containing the extensive research conducted by NYUAD’s Dfx team into logic-locking technology will be presented in November at this year’s edition of the ACM Conference on Computer and Communications Security, ACM CCS 2017, the leading cyber security conference in the world.

Recent Posts

My Blog List

HOT GALLERY

ලිංගික අධ්‍යාපනය

Counter