Login / Signup
Execution at RISC: Stealth JOP Attacks on RISC-V Applications.
Loïc Buckwell
Olivier Gilles
Daniel Gracia Pérez
Nikolai Kosmatov
Published in:
CoRR (2023)
Keyphrases
</>
application specific
instruction set
low power consumption
general purpose
connected component labeling
hardware architecture
low cost
execution model
countermeasures
real time
security mechanisms
multiresolution
neural network
database
watermarking scheme
malicious attacks
data sets
chosen plaintext