Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference10 articles.
1. [1] ARM, “ARM Q1 2017 Roadshow,” http://www.arm.com/company/investors, 2017.
2. [2] M. Lipp, D. Gruss, R. Spreitzer, C. Maurice, and S. Mangard, “ARMageddon: Cache attacks on mobile devices,” Proceedings of the 25th USENIX Security Symposium (Security), Austin, TX, pp.549-564, Aug. 2016.
3. [3] H. Cho, P. Zhang, D. Kim, J. Park, C.-H. Lee, Z. Zhao, A. Doupé, and G.-J. Ahn, “Prime+count: Novel cross-world covert channels on arm trustzone,” Proceedings of the 34th Annual Computer Security Applications Conference, pp.441-452, 2018. 10.1145/3274694.3274704
4. [4] D.A. Osvik, A. Shamir, and E. Tromer, “Cache attacks and countermeasures: the case of AES,” Proceedings of the Cryptographer's Track at the RSA Conference (CT-RSA), vol.3860, pp.1-20, 2006. 10.1007/11605805_1
5. [5] J. Jang, S. Kong, M. Kim, D. Kim, and B.B. Kang, “SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment,” Proceedings of the 2015 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2015. 10.14722/ndss.2015.23189
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A fast hardware implementation method of interrupt handling based on Armv8-M architecture;Fourth International Conference on Telecommunications, Optics, and Computer Science (TOCS 2023);2024-05-07