Author:
Qiu Pengfei,Wang Dongsheng,Lyu Yongqiang,Qu Gang
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
2. PMU-Spill: A New Side Channel for Transient Execution Attacks;IEEE Transactions on Circuits and Systems I: Regular Papers;2023-12
3. Assessing the Vulnerability of Time-Controlled Logic-Loop-Based Circuits to Voltage Fault Injection and Power Monitoring Attacks;2023 International Conference on IC Design and Technology (ICICDT);2023-09-25
4. Processor Vulnerability Discovery;2023 60th ACM/IEEE Design Automation Conference (DAC);2023-07-09
5. EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks;2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2023-05-01