Login / Signup

On the Malicious Potential of Xilinx's Internal Configuration Access Port (ICAP).

Nils AlbartusMaik EnderJan-Niklas MöllerMarc FyrbiakChristof PaarRussell Tessier
Published in: ACM Trans. Reconfigurable Technol. Syst. (2024)
Keyphrases
  • high speed
  • optimal configuration
  • neural network
  • image sequences
  • database
  • databases
  • data mining
  • artificial intelligence
  • digital libraries
  • access control
  • remote access
  • malicious attacks