System on Chip Rejuvenation in the Wake of Persistent Attacks.
Ahmad T. SheikhAli ShokerPaulo Esteves-VeríssimoPublished in: CoRR (2023)
Keyphrases
- hardware and software
- countermeasures
- power consumption
- watermarking scheme
- malicious attacks
- denial of service attacks
- data center
- embedded systems
- terrorist attacks
- security risks
- data mining
- watermarking algorithm
- resource utilization
- security threats
- hardware software partitioning
- malicious users
- design methodology
- resource management
- information security
- information systems