Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using ic fingerprinting. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 296–310 (2007)
2. Akkar, M.-L., Bevan, R., Dischamp, P., Moyart, D.: Power analysis, what is now possible. In: Asiacrypt: Proceedings of Advances in Cryptology (2000)
3. Advanced Micro Devices (AMD). Amd virtualisation solutions (2007),
http://enterprise.amd.com/us-en/AMD-Business/business-Solutions/Consolidation/Virtualization.aspx
4. Bellard, F.: Qemu opensource processor emulator (2007),
http://fabrice.bellard.free.fr/qemu
5. Bertoni, G., Zaccaria, V., Breveglieri, L., Monchiero, M.: Aes power attack based on induced cache miss and countermeasure. In: Proceedings of the International Conference on Information Technology: Coding and Computing (2005)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions;IET Information Security;2022-03-09
2. SPECS;ACM SIGARCH Computer Architecture News;2015-05-29
3. SPECS;ACM SIGPLAN Notices;2015-05-12
4. SPECS;Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems;2015-03-14
5. Enforcing kernel constraints by hardware-assisted virtualization;Journal in Computer Virology;2009-08-21