Login / Signup
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet.
Ben Lapid
Avishai Wool
Published in:
ESORICS (1) (2018)
Keyphrases
</>
countermeasures
watermarking scheme
data access
back end
security protocols
malicious attacks
hit rate
main memory
prefetching
traffic analysis
malicious users
data mining
attack detection
cache management
security threats
memory hierarchy
watermarking technique
query processing
stream cipher
cooperative