Are Cold Boot Attacks Still Feasible: A Case Study on Raspberry Pi With Stacked Memory.
Yoo-Seung WonShivam BhasinPublished in: FDTC (2021)
Keyphrases
- data corruption
- memory requirements
- memory space
- memory usage
- test bed
- case study
- countermeasures
- memory size
- feasible solution
- limited memory
- denial of service attacks
- security threats
- computer security
- neural network
- security protocols
- computing power
- signal processing
- computational power
- malicious attacks
- terrorist attacks
- attack detection
- main memory