Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security.
Marcus BotacinAndré GrégioPublished in: ISC (2022)
Keyphrases
- low cost
- information security
- computer security
- theoretical framework
- real time
- random number generator
- trusted computing
- access control
- network security
- hardware and software
- intrusion detection
- security policies
- security mechanisms
- information systems
- smart card
- data acquisition
- hardware implementation
- theoretical basis
- security requirements
- computer systems
- general theory
- security level
- signal processing