共 192 条
- [61] Murdock K, Oswald D, Garcia F D, Et al., Plundervolt: Software-based dault injection attacks against Intel SGX, Proc of 2020 IEEE Symp on Security and Privacy, pp. 1466-1482, (2020)
- [62] Kocher P, Horn J, Fogh A, Et al., Spectre attacks: Exploiting speculative execution, Proc of 2019 IEEE Symp on Security and Privacy, pp. 1-19, (2019)
- [63] Szefer J., Survey of microarchitectural side and covert channels, attacks, and defenses, Journal of Hardware and Systems Security, 3, 3, pp. 219-234, (2018)
- [64] Liu Lijun, Wang Tao, Wang Xiaohan, Method of implanting hardware Trojan based on EHW in part of circuit, Journal of Electronic Testing, 37, 2, pp. 279-284, (2021)
- [65] Mutlu O, Kim J S., Rowhammer: A retrospective, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39, 8, pp. 1555-1571, (2019)
- [66] Pinto S, Santos N., Demystifying arm TrustZone: A comprehensive survey, ACM Computing Surveys, 51, 6, pp. 1-36, (2019)
- [67] Qiu Pengfei, Wang Dongsheng, Lyu Yongqiang, Et al., VoltJockey: Breaching TrustZone by software-controlled voltage manipulation over multi-core frequencies, Proc of the 2019 ACM SIGSAC Conf, pp. 195-209, (2019)
- [68] Hu Wei, Althoff A, Ardeshiricham A, Et al., Towards property driven hardware security, Proc of the 17th Int Workshop on Microprocessor & SOC Test & Verification, pp. 51-56, (2016)
- [69] Halderman J A, Schoen S D, Heninger N, Et al., Lest we remember: Cold-Boot attacks on encryption keys, Communications of the ACM, 52, 5, pp. 91-98, (2009)
- [70] Kim Y, Daly R, Kim J, Et al., Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors, ACM SIGARCH Computer Architecture News, 42, 3, pp. 361-372, (2014)