Author:
Werner Mario,Wenger Erich,Mangard Stefan
Publisher
Springer International Publishing
Reference13 articles.
1. Abadi, M., Budiu, M., Erlingsson, Ú., Ligatti, J.: Control-flow integrity principles, implementations, and applications. In: ACM Transactions on Information and System Security (TISSEC), pp. 4:1–4:40, November 2009
2. Arora, D., Ravi, S., Raghunathan, A., Jha, N.: Hardware-assisted run-time monitoring for secure program execution on embedded processors. IEEE Trans. VLSI Syst. 14(12), 1295–1308 (2006)
3. Lecture Notes in Computer Science;D Boneh,1997
4. Free60.org: (2012).
http://free60.org/wiki/Reset_Glitch_Hack
5. Information Security and Cryptography,2012
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks;IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems;2023-12
2. EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks;2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2023-05-01
3. CompaSeC;Proceedings of the 28th Asia and South Pacific Design Automation Conference;2023-01-16
4. Fault Attacks on Access Control in Processors: Threat, Formal Analysis and Microarchitectural Mitigation;IEEE Access;2023
5. Recommendation for a Holistic Secure Embedded ISA Extension;Applied Cryptography and Network Security;2023