Author:
Gassend B.,Suh G.E.,Clarke D.,van Dijk M.,Devadas S.
Cited by
114 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. MetaLeak: Uncovering Side Channels in Secure Processor Architectures Exploiting Metadata;2024 ACM/IEEE 51st Annual International Symposium on Computer Architecture (ISCA);2024-06-29
2. A Midsummer Night’s Tree: Efficient and High Performance Secure SCM;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3;2024-04-27
3. Data Enclave: A Data-Centric Trusted Execution Environment;2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA);2024-03-02
4. SecureLoop: Design Space Exploration of Secure DNN Accelerators;56th Annual IEEE/ACM International Symposium on Microarchitecture;2023-10-28
5. HMT: A Hardware-centric Hybrid Bonsai Merkle Tree Algorithm for High-performance Authentication;ACM Transactions on Embedded Computing Systems;2023-07-24