Sign in

HUnTer: Hardware Underneath Trigger for Exploiting SoC-level Vulnerabilities.

Sree Ranjani RajendranShams TarekBenjamin M. HicksHadi Mardani KamaliFarimah FarahmandiMark M. Tehranipoor
Published in: DATE (2023)
Keyphrases
  • hardware and software
  • low cost
  • computer systems
  • higher level
  • low power
  • real time
  • hardware implementation
  • lower level
  • computing systems
  • image processing
  • image processing algorithms
  • application level