Login / Signup

CPU bugs, CPU backdoors and consequences on security.

Loïc Duflot
Published in: J. Comput. Virol. (2009)
Keyphrases
  • access control
  • data transfer
  • security requirements
  • information systems
  • security vulnerabilities
  • database
  • operating system
  • software systems
  • security mechanisms