Verification of serialising instructions for security against transient execution attacks.
Kushal K. PonugotiSudarshan K. SrinivasanNimish MathurePublished in: IET Comput. Digit. Tech. (2023)
Keyphrases
- java card
- cryptographic protocols
- fault injection
- control flow
- countermeasures
- security threats
- smart card
- security problems
- high security
- computer security
- security measures
- cyber attacks
- security mechanisms
- security protocols
- static analysis
- stream cipher
- virtual machine
- malicious users
- security issues
- information security
- denial of service attacks
- security breaches
- security vulnerabilities
- chosen plaintext
- malicious attacks
- security flaws
- security risks
- integrity verification
- security model
- cyber security
- model checking
- steady state
- security requirements
- insider attacks
- intrusion detection and prevention
- security management
- elliptic curve
- intrusion detection
- information leakage
- advanced encryption standard
- intrusion prevention