Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks.
Yaosong LuWeijie LiuWenhao WangPublished in: ISPA/BDCloud/SocialCom/SustainCom (2020)
Keyphrases
- low cost
- hardware and software
- real time
- countermeasures
- high end
- computing power
- watermarking scheme
- computer systems
- hardware implementation
- parallel machines
- massively parallel
- traffic analysis
- hardware architecture
- security threats
- protection schemes
- parallel hardware
- malicious users
- image watermarking
- security protocols
- personal computer
- information systems