V0LTpwn: Attacking x86 Processor Integrity from Software.
Zijo KenjarTommaso FrassettoDavid GensMichael FranzAhmad-Reza SadeghiPublished in: CoRR (2019)
Keyphrases
- industry standard
- high speed
- user interface
- high end
- software systems
- source code
- software architecture
- software tools
- artificial intelligence
- hardware design
- software design
- software projects
- computer systems
- software development
- parallel processing
- software package
- open source
- database
- development process
- integrity constraints
- software testing
- integrity checking