Login / Signup
Resurrection Attack: Defeating Xilinx MPU's Memory Protection.
Bharadwaj Madabhushi
Chandra Sekhar Mummidi
Sandip Kundu
Daniel E. Holcomb
Published in:
HOST (2024)
Keyphrases
</>
memory requirements
high speed
countermeasures
information security
computing power
data corruption
hardware implementation
memory usage
memory space
memory size
main memory
secret key
random access
detection mechanism
protection scheme
fpga implementation