Login / Signup
V0LTpwn: Attacking x86 Processor Integrity from Software.
Zijo Kenjar
Tommaso Frassetto
David Gens
Michael Franz
Ahmad-Reza Sadeghi
Published in:
USENIX Security Symposium (2020)
Keyphrases
</>
software tools
high speed
software systems
high end
source code
software development
software design
case study
software architecture
high assurance
industry standard
integrity constraints
software quality
software maintenance
embedded systems
database
computer systems
databases