Login / Signup
Execution at RISC: Stealth JOP Attacks on RISC-V Applications.
Loïc Buckwell
Olivier Gilles
Daniel Gracia Pérez
Nikolai Kosmatov
Published in:
ESORICS Workshops (2) (2023)
Keyphrases
</>
application specific
instruction set
low power consumption
countermeasures
hardware architecture
general purpose
connected component labeling
execution model
low cost
binary images
low power
malicious attacks
terrorist attacks
computation intensive
neural network
multiresolution