Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks.
Youngjoo ShinJoobeom YunPublished in: IEEE Access (2021)
Keyphrases
- security protocols
- security mechanisms
- countermeasures
- advanced encryption standard
- prefetching
- data access
- resource consumption
- multimedia
- cryptographic algorithms
- query processing
- digital libraries
- watermarking scheme
- malicious attacks
- vehicle routing
- wireless sensor networks
- security threats
- hit rate
- garbage collection
- denial of service attacks
- resource constrained
- cache management
- main memory
- database systems
- website
- anomaly detection
- memory hierarchy
- embedded processors