Login / Signup
Resurrection Attack: Defeating Xilinx MPU's Memory Protection.
Bharadwaj Madabhushi
Chandra Sekhar Mummidi
Sandip Kundu
Daniel E. Holcomb
Published in:
CoRR (2024)
Keyphrases
</>
high speed
hardware implementation
memory usage
main memory
memory requirements
information security
countermeasures
wireless sensor networks
random access
memory space
limited memory
data protection
detection mechanism
protection scheme
data corruption