Login / Signup
A Hybrid Solution for Constrained Devices to Detect Microarchitectural Attacks.
Nikolaos Foivos Polychronou
Pierre-Henri Thevenon
Maxime Puys
Vincent Beroulle
Published in:
EuroS&P Workshops (2023)
Keyphrases
</>
detection algorithm
linear equations
mobile devices
detection method
mathematical model
automatic detection
watermarking scheme
malicious attacks
watermarking algorithm
terrorist attacks