Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Hardware mechanisms for memory authentication: A survey of existing techniques and engines
R Elbaz, D Champagne, C Gebotys, RB Lee… - … Science IV: Special …, 2009 - Springer
Trusted computing platforms aim to provide trust in computations performed by sensitive
applications. Verifying the integrity of memory contents is a crucial security service that these …
applications. Verifying the integrity of memory contents is a crucial security service that these …
[KİTAP][B] On-chip communication architectures: system on chip interconnect
S Pasricha, N Dutt - 2010 - books.google.com
Over the past decade, system-on-chip (SoC) designs have evolved to address the ever
increasing complexity of applications, fueled by the era of digital convergence …
increasing complexity of applications, fueled by the era of digital convergence …
NOC-centric security of reconfigurable SoC
JP Diguet, S Evain, R Vaslin… - … on Networks-on-Chip …, 2007 - ieeexplore.ieee.org
This paper presents a first solution for NoC-based communication security. Our proposal is
based on simple network interfaces implementing distributed security rule checking and a …
based on simple network interfaces implementing distributed security rule checking and a …
Tec-tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory
integrity. With a trusted System-on-Chip, the existing countermeasures against replay …
integrity. With a trusted System-on-Chip, the existing countermeasures against replay …
[PDF][PDF] Protecting data in-use from firmware and physical attacks
S Weis - Black Hat, 2014 - blackhat.com
Defending computers from unauthorized physical access, malicious hardware devices, or
other low-level attacks has proven extremely challenging. The risks from these attacks are …
other low-level attacks has proven extremely challenging. The risks from these attacks are …
Minimal kernel: an operating system architecture for {TEE} to resist board level physical attacks
ARM specifications recommend that software residing in TEE's (Trusted Execution
Environment) secure world should be located in the on-chip memory to prevent board level …
Environment) secure world should be located in the on-chip memory to prevent board level …
Towards fast hardware memory integrity checking with skewed merkle trees
J Szefer, S Biedermann - Proceedings of the Third Workshop on …, 2014 - dl.acm.org
Protection of a computer's memory's integrity is crucial in situations where physical attacks
on the computer system are a threat. Such attacks can happen during physical break in into …
on the computer system are a threat. Such attacks can happen during physical break in into …
Protection of heterogeneous architectures on FPGAs: An approach based on hardware firewalls
Embedded systems are parts of our daily life and used in many fields. They can be found in
smartphones or in modern cars including GPS, light/rain sensors and other electronic …
smartphones or in modern cars including GPS, light/rain sensors and other electronic …
Configurable memory security in embedded systems
System security is an increasingly important design criterion for many embedded systems.
These systems are often portable and more easily attacked than traditional desktop and …
These systems are often portable and more easily attacked than traditional desktop and …
Secbus, a software/hardware architecture for securing external memories
J Brunel, R Pacalet, S Ouaarab… - 2014 2nd IEEE …, 2014 - ieeexplore.ieee.org
Embedded systems are ubiquitous nowadays. In many cases, they manipulate sensitive
applications or data and may be the target of logical or physical attacks. On systems that …
applications or data and may be the target of logical or physical attacks. On systems that …