Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Plundervolt: Software-based fault injection attacks against Intel SGX
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …
growing heat and power consumption in modern processors. Design restrictions ensure …
Rambleed: Reading bits in memory without accessing them
The Rowhammer bug is a reliability issue in DRAM cells that can enable an unprivileged
adversary to flip the values of bits in neighboring rows on the memory module. Previous …
adversary to flip the values of bits in neighboring rows on the memory module. Previous …
Another flip in the wall of rowhammer defenses
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from
unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated …
unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated …
Reliability-aware design to suppress aging
Due to aging, circuit reliability has become extraordinary challenging. Reliability-aware
circuit design flows do virtually not exist and even research is in its infancy. In this paper, we …
circuit design flows do virtually not exist and even research is in its infancy. In this paper, we …
UnTrustZone: Systematic accelerated aging to expose on-chip secrets
As technology scaling brings society closer to the vision of smart dust, system designers
must address the threat of physical attacks. To address the threat of physical access to …
must address the threat of physical attacks. To address the threat of physical access to …
Pseudorandom black swans: Cache attacks on CTR_DRBG
Modern cryptography requires the ability to securely generate pseudorandom numbers.
However, despite decades of work on side-channel attacks, there is little discussion of their …
However, despite decades of work on side-channel attacks, there is little discussion of their …
Detecting failures and attacks via digital sensors
Detection of abnormal behaviors is essential in complex and/or strategic systems requiring a
high level of safety and security. Sensing environmental conditions to ensure that the device …
high level of safety and security. Sensing environmental conditions to ensure that the device …
Aadam: A fast, accurate, and versatile aging-aware cell library delay model using feed-forward neural network
With the CMOS technology scaling, transistor aging has become one major issue affecting
circuit reliability and lifetime. There are two major classes of existing studies that model the …
circuit reliability and lifetime. There are two major classes of existing studies that model the …
Toward security closure in the face of reliability effects iccad special session paper
J Lienig, S Rothe, M Thiele… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
The reliable operation of ICs is subject to physical effects like electromigration, thermal and
stress migration, negative bias temperature instability, hot-carrier injection, etc. While these …
stress migration, negative bias temperature instability, hot-carrier injection, etc. While these …
An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies
With the modern semiconductor supply chain, the ownership of both intellectual property (IP)
and integrated circuit (IC) cannot be guaranteed. The IP piracy may take place at the …
and integrated circuit (IC) cannot be guaranteed. The IP piracy may take place at the …