Fabrication Attacks: Zero-Overhead Malicious Modifications Enabling Modern Microprocessor Privilege Escalation.
Nektarios Georgios TsoutsosMichail ManiatakosPublished in: IEEE Trans. Emerg. Top. Comput. (2014)
Keyphrases
- detect malicious
- malicious users
- malicious attacks
- detecting malicious
- malicious behavior
- high speed
- insider attacks
- malicious code
- malicious activities
- integrated circuit
- malicious traffic
- normal traffic
- high density
- countermeasures
- insider threat
- silicon on insulator
- design methodology
- semi fragile watermarking
- data corruption
- special purpose hardware
- network traffic
- electron beam
- security issues
- floating point
- watermarking scheme
- semiconductor devices
- malicious nodes
- functional verification
- security threats
- cryptographic protocols
- physical design