Gross, 2023 - Google Patents
Remote Security Threats and Protection of Modern FPGA-SoC ArchitecturesGross, 2023
View PDF- Document ID
- 9089149835151572522
- Author
- Gross M
- Publication year
External Links
Snippet
In the last decade we have seen an increase in the popularity of hardware based acceleration through the performance achieved in domains such as machine learning, communication, and security. Due to their flexibility and power-efficiency, Field …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3758287B1 (en) | Deterministic encryption key rotation | |
| Henson et al. | Memory encryption: A survey of existing techniques | |
| Mohammad et al. | Required policies and properties of the security engine of an SoC | |
| Suh et al. | AEGIS: A single-chip secure processor | |
| US20170230179A1 (en) | Password triggered trusted encrytpion key deletion | |
| Meijer et al. | Self-encrypting deception: weaknesses in the encryption of solid state drives | |
| US10303900B2 (en) | Technologies for secure programming of a cryptographic engine for trusted I/O | |
| Sparks | A security assessment of trusted platform modules | |
| Gross et al. | Breaking trustzone memory isolation through malicious hardware on a modern fpga-soc | |
| Li et al. | Establishing software-only root of trust on embedded systems: facts and fiction | |
| Gross et al. | Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC | |
| Gross et al. | Enhancing the security of FPGA-SoCs via the usage of ARM TrustZone and a hybrid-TPM | |
| Guan et al. | Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM | |
| Streit et al. | Secure boot from non-volatile memory for programmable SoC architectures | |
| Olson et al. | Security implications of third-party accelerators | |
| Barbareschi et al. | Advancing wsn physical security adopting tpm-based architectures | |
| Jacob et al. | faulTPM: Exposing AMD fTPMs’ Deepest Secrets | |
| Mishra et al. | Modern hardware security: A review of attacks and countermeasures | |
| Russinovich et al. | Toward confidential cloud computing: Extending hardware-enforced cryptographic protection to data while in use | |
| De Meulemeester et al. | BadRAM: Practical memory aliasing attacks on trusted execution environments | |
| Wang et al. | Towards secure runtime customizable trusted execution environment on fpga-soc | |
| Mahmoud et al. | X-Attack 2.0: the risk of power wasters and satisfiability don’t-care hardware trojans to shared cloud FPGAs | |
| McGregor et al. | Protecting cryptographic keys and computations via virtual secure coprocessing | |
| Meijer et al. | Self-encrypting deception: weaknesses in the encryption of solid state drives (SSDs) | |
| Siddiqui et al. | Secure design flow of FPGA based RISC-V implementation |