In Hardware We Trust
Author:
Affiliation:
1. Radboud University, The Netherlands
2. TU Darmstadt, Germany
3. KU Leuven, Belgium
Publisher
ACM
Link
https://dl.acm.org/doi/pdf/10.1145/3316781.3323480
Reference44 articles.
1. C-FLAT
2. ARM Limited. 2008. Security technology: building a secure system using TrustZone technology. http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf. ARM Limited. 2008. Security technology: building a secure system using TrustZone technology. http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf.
3. D. Bernstein T. Lange and P. Schwabe. 2012. The Security Impact of a New Cryptographic Library. In LATINCRYPT (Lecture Notes in Computer Science). 10.1007/978-3-642-33481-8_9 D. Bernstein T. Lange and P. Schwabe. 2012. The Security Impact of a New Cryptographic Library. In LATINCRYPT (Lecture Notes in Computer Science). 10.1007/978-3-642-33481-8_9
4. A. Bhattacharyya A. Sandulescu M. Neugschwandtner A. Sorniotti B.k Falsafi M. Payer and A. Kurmus. 2019. SMoTherSpectre: exploiting speculative execution through port contention. arXiv preprint arXiv:1903.01843 (2019). A. Bhattacharyya A. Sandulescu M. Neugschwandtner A. Sorniotti B.k Falsafi M. Payer and A. Kurmus. 2019. SMoTherSpectre: exploiting speculative execution through port contention. arXiv preprint arXiv:1903.01843 (2019).
5. D. Boneh R. DeMillo and R. Lipton. 1997. On the Importance of Checking Cryptographic Protocols for Faults (Advances in Cryptology - EUROCRYPT '97). D. Boneh R. DeMillo and R. Lipton. 1997. On the Importance of Checking Cryptographic Protocols for Faults (Advances in Cryptology - EUROCRYPT '97).
Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On the Resiliency of Protected Masked S-Boxes Against Template Attack in the Presence of Temperature and Aging Misalignments;IEEE Transactions on Very Large Scale Integration (VLSI) Systems;2024-05
2. A Survey on Thwarting Memory Corruption in RISC-V;ACM Computing Surveys;2023-09-14
3. TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices;Security and Communication Networks;2022-05-25
4. Design and Implementation of Secure Cryptographic System on Chip for Internet of Things;IEEE Access;2022
5. DR.SGX;Proceedings of the 35th Annual Computer Security Applications Conference;2019-12-09
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3