FPGA-to-CPU Undervolting Attacks.
Dina G. MahmoudSamah HusseinVincent LendersMirjana StojilovicPublished in: DATE (2022)
Keyphrases
- buffer overflow
- high speed
- countermeasures
- security protocols
- watermarking scheme
- hardware implementation
- security mechanisms
- hardware design
- malicious users
- attack detection
- real time image processing
- traffic analysis
- signal processing
- low cost
- cryptographic protocols
- security threats
- security risks
- denial of service attacks
- data corruption
- terrorist attacks
- hardware architectures
- protection schemes
- real time
- digital signal
- malicious attacks
- parallel architecture
- field programmable gate array
- wireless sensor networks