Literatura académica sobre el tema "Secure microarchitecture"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Secure microarchitecture".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Secure microarchitecture"
Li, Xinyao y Akhilesh Tyagi. "Cross-World Covert Channel on ARM Trustzone through PMU". Sensors 22, n.º 19 (28 de septiembre de 2022): 7354. http://dx.doi.org/10.3390/s22197354.
Texto completoGnanavel, S., K. E. Narayana, K. Jayashree, P. Nancy y Dawit Mamiru Teressa. "Implementation of Block-Level Double Encryption Based on Machine Learning Techniques for Attack Detection and Prevention". Wireless Communications and Mobile Computing 2022 (9 de julio de 2022): 1–9. http://dx.doi.org/10.1155/2022/4255220.
Texto completoStolz, Florian, Jan Philipp Thoma, Pascal Sasdrich y Tim Güneysu. "Risky Translations: Securing TLBs against Timing Side Channels". IACR Transactions on Cryptographic Hardware and Embedded Systems, 29 de noviembre de 2022, 1–31. http://dx.doi.org/10.46586/tches.v2023.i1.1-31.
Texto completoSahni, Abdul Rasheed, Hamza Omar, Usman Ali y Omer Khan. "ASM: An Adaptive Secure Multicore for Co-located Mutually Distrusting Processes". ACM Transactions on Architecture and Code Optimization, 17 de marzo de 2023. http://dx.doi.org/10.1145/3587480.
Texto completoCabrera Aldaya, Alejandro y Billy Bob Brumley. "Online Template Attacks: Revisited". IACR Transactions on Cryptographic Hardware and Embedded Systems, 9 de julio de 2021, 28–59. http://dx.doi.org/10.46586/tches.v2021.i3.28-59.
Texto completoNarayan, Akhilesh S., Ashish J, Noor Afreen, Lithesh V S y Sandeep R. "RTL Design, Verification and Synthesis of Secure Hash Algorithm to implement on an ASIC Processor". International Journal of Scientific Research in Science, Engineering and Technology, 1 de mayo de 2019, 70–75. http://dx.doi.org/10.32628/ijsrset196318.
Texto completoYu, Jiyong, Lucas Hsiung, Mohamad El Hajj y Christopher Fletcher. "Creating Foundations for Secure Microarchitectures with Data-Oblivious ISA Extensions". IEEE Micro, 2020, 1. http://dx.doi.org/10.1109/mm.2020.2985366.
Texto completoSakalis, Christos, Stefanos Kaxiras y Magnus Själander. "Delay-on-Squash: Stopping Microarchitectural Replay Attacks in Their Tracks". ACM Transactions on Architecture and Code Optimization, 19 de septiembre de 2022. http://dx.doi.org/10.1145/3563695.
Texto completoNaghibijouybari, Hoda, Esmaeil Mohammadian Koruyeh y Nael Abu-Ghazaleh. "Microarchitectural Attacks in Heterogeneous Systems: A Survey". ACM Computing Surveys, 15 de junio de 2022. http://dx.doi.org/10.1145/3544102.
Texto completoTesis sobre el tema "Secure microarchitecture"
Zabel, Martin, Thomas B. Preußer, Peter Reichel y Rainer G. Spallek. "SHAP-Secure Hardware Agent Platform". Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200701011.
Texto completoJain, Rajat. "Achieving practical secure non-volatile memory system with in-Memory Integrity Verification (iMIV)". Thesis, 2022. https://etd.iisc.ac.in/handle/2005/5867.
Texto completoCapítulos de libros sobre el tema "Secure microarchitecture"
Grimsdal, Gunnar, Patrik Lundgren, Christian Vestlund, Felipe Boeira y Mikael Asplund. "Can Microkernels Mitigate Microarchitectural Attacks?" En Secure IT Systems, 238–53. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35055-0_15.
Texto completoSepúlveda, Johanna. "Secure Cryptography Integration: NoC-Based Microarchitectural Attacks and Countermeasures". En Network-on-Chip Security and Privacy, 153–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69131-8_7.
Texto completoLiu, Chen, Xiaobin Li, Shaoshan Liu y Jean-Luc Gaudiot. "Simultaneous MultiThreading Microarchitecture". En Handbook of Research on Scalable Computing Technologies, 552–82. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-661-7.ch024.
Texto completoActas de conferencias sobre el tema "Secure microarchitecture"
Kanuparthi, Arun K., Ramesh Karri, Gaston Ormazabal y Sateesh K. Addepalli. "A high-performance, low-overhead microarchitecture for secure program execution". En 2012 IEEE 30th International Conference on Computer Design (ICCD 2012). IEEE, 2012. http://dx.doi.org/10.1109/iccd.2012.6378624.
Texto completoMiao, Chenlu, Kai Bu, Mengming Li, Shaowu Mao y Jianwei Jia. "SwiftDir: Secure Cache Coherence without Overprotection". En 2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2022. http://dx.doi.org/10.1109/micro56248.2022.00052.
Texto completoLehman, Tamara Silbergleit, Andrew D. Hilton y Benjamin C. Lee. "PoisonIvy: Safe speculation for secure memory". En 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2016. http://dx.doi.org/10.1109/micro.2016.7783741.
Texto completoZabel, Martin, T. B. Preusser, Peter Reichel y Rainer G. Spallek. "Secure, Real-Time and Multi-Threaded General-Purpose Embedded Java Microarchitecture". En 2007 10th Euromicro Conference on Digital System Design: Architectures, Methods and Tools. IEEE, 2007. http://dx.doi.org/10.1109/dsd.2007.4341450.
Texto completoShi, Weidong y Hsien-Hsin S. Lee. "Authentication Control Point and Its Implications For Secure Processor Design". En 2006 39th IEEE/ACM International Symposium on Microarchitecture. IEEE, 2006. http://dx.doi.org/10.1109/micro.2006.11.
Texto completoWang, Xin, Daulet Talapkaliyev, Matthew Hicks y Xun Jian. "Self-Reinforcing Memoization for Cryptography Calculations in Secure Memory Systems". En 2022 55th IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2022. http://dx.doi.org/10.1109/micro56248.2022.00055.
Texto completoOmar, Hamza y Omer Khan. "IRONHIDE: A Secure Multicore that Efficiently Mitigates Microarchitecture State Attacks for Interactive Applications". En 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA). IEEE, 2020. http://dx.doi.org/10.1109/hpca47549.2020.00019.
Texto completoHe, Zecheng y Ruby B. Lee. "How secure is your cache against side-channel attacks?" En MICRO-50: The 50th Annual IEEE/ACM International Symposium on Microarchitecture. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3123939.3124546.
Texto completoFreij, Alexander, Huiyang Zhou y Yan Solihin. "Bonsai Merkle Forests: Efficiently Achieving Crash Consistency in Secure Persistent Memory". En MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3466752.3480067.
Texto completoSaileshwar, Gururaj, Prashant J. Nair, Prakash Ramrakhyani, Wendy Elsasser, Jose A. Joao y Moinuddin K. Qureshi. "Morphable Counters: Enabling Compact Integrity Trees For Low-Overhead Secure Memories". En 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2018. http://dx.doi.org/10.1109/micro.2018.00041.
Texto completo