Login / Signup
Using Hardware Performance Counters to Detect Control Hijacking Attacks.
Miao Yu
Basel Halak
Mark Zwolinski
Published in:
IVSW (2019)
Keyphrases
</>
control method
control program
data acquisition
low cost
detection algorithm
real time
countermeasures
security mechanisms
control unit
control system
robotic systems
personal computer
computing systems
computing power
hardware architecture
vlsi implementation
video sequences