Revisiting Rowhammer Attacks in Embedded Systems.
Lidia Pocero FraileApostolos P. FournarisOdysseas G. KoufopavlouPublished in: DTIS (2019)
Keyphrases
- embedded systems
- low cost
- computing power
- resource limited
- embedded devices
- real time systems
- processing power
- embedded software
- field programmable gate array
- resource constrained
- real time image processing
- software systems
- hardware software
- flash memory
- security mechanisms
- hw sw
- consumer electronics
- security protocols
- embedded real time systems
- safety critical
- communication technologies
- distributed systems
- relational databases
- watermarking scheme
- signal processing
- open source
- software engineering
- object oriented
- data model
- database systems
- protocol stack
- artificial intelligence