+

Gross, 2023 - Google Patents

Remote Security Threats and Protection of Modern FPGA-SoC Architectures

Gross, 2023

View PDF
Document ID
9089149835151572522
Author
Gross M
Publication year

External Links

Snippet

In the last decade we have seen an increase in the popularity of hardware based acceleration through the performance achieved in domains such as machine learning, communication, and security. Due to their flexibility and power-efficiency, Field …
Continue reading at mediatum.ub.tum.de (PDF) (other versions)

Similar Documents

Publication Publication Date Title
EP3758287B1 (en) Deterministic encryption key rotation
Henson et al. Memory encryption: A survey of existing techniques
Mohammad et al. Required policies and properties of the security engine of an SoC
Suh et al. AEGIS: A single-chip secure processor
US20170230179A1 (en) Password triggered trusted encrytpion key deletion
Meijer et al. Self-encrypting deception: weaknesses in the encryption of solid state drives
US10303900B2 (en) Technologies for secure programming of a cryptographic engine for trusted I/O
Sparks A security assessment of trusted platform modules
Gross et al. Breaking trustzone memory isolation through malicious hardware on a modern fpga-soc
Li et al. Establishing software-only root of trust on embedded systems: facts and fiction
Gross et al. Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC
Gross et al. Enhancing the security of FPGA-SoCs via the usage of ARM TrustZone and a hybrid-TPM
Guan et al. Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM
Streit et al. Secure boot from non-volatile memory for programmable SoC architectures
Olson et al. Security implications of third-party accelerators
Barbareschi et al. Advancing wsn physical security adopting tpm-based architectures
Jacob et al. faulTPM: Exposing AMD fTPMs’ Deepest Secrets
Mishra et al. Modern hardware security: A review of attacks and countermeasures
Russinovich et al. Toward confidential cloud computing: Extending hardware-enforced cryptographic protection to data while in use
De Meulemeester et al. BadRAM: Practical memory aliasing attacks on trusted execution environments
Wang et al. Towards secure runtime customizable trusted execution environment on fpga-soc
Mahmoud et al. X-Attack 2.0: the risk of power wasters and satisfiability don’t-care hardware trojans to shared cloud FPGAs
McGregor et al. Protecting cryptographic keys and computations via virtual secure coprocessing
Meijer et al. Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs)
Siddiqui et al. Secure design flow of FPGA based RISC-V implementation
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载