Login / Signup

A Hybrid Solution for Constrained Devices to Detect Microarchitectural Attacks.

Nikolaos Foivos PolychronouPierre-Henri ThevenonMaxime PuysVincent Beroulle
Published in: EuroS&P Workshops (2023)
Keyphrases
  • detection algorithm
  • linear equations
  • mobile devices
  • detection method
  • mathematical model
  • automatic detection
  • watermarking scheme
  • malicious attacks
  • watermarking algorithm
  • terrorist attacks