Author:
Taram Mohammadkazem,Venkat Ashish,Tullsen Dean
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cryptographically Secured Data Transmission Over a Network with NetCAT;2024 International Conference on Electronics, Computing, Communication and Control Technology (ICECCC);2024-05-02
2. Methods of Identifying and Reducing Covert Channel Attacks: An Analysis;2023 2nd International Conference on Futuristic Technologies (INCOFT);2023-11-24
3. Detection and Mitigation Mechanisms for Covert Channel Attack;2023 IEEE International Carnahan Conference on Security Technology (ICCST);2023-10-11
4. Microarchitectural Vulnerabilities Introduced, Exploited, and Accelerated by Heterogeneous FPGA-CPU Platforms;Security of FPGA-Accelerated Cloud Computing Environments;2023-09-18
5. DevIOus: Device-Driven Side-Channel Attacks on the IOMMU;2023 IEEE Symposium on Security and Privacy (SP);2023-05