Login / Signup
On the Malicious Potential of Xilinx's Internal Configuration Access Port (ICAP).
Nils Albartus
Maik Ender
Jan-Niklas Möller
Marc Fyrbiak
Christof Paar
Russell Tessier
Published in:
ACM Trans. Reconfigurable Technol. Syst. (2024)
Keyphrases
</>
high speed
optimal configuration
neural network
image sequences
database
databases
data mining
artificial intelligence
digital libraries
access control
remote access
malicious attacks