Autor | Dessouky, Ghada; Gens, David; Haney, Patrick; Persyn, Garrett; Kanuparthi, Arun K.; Khattri, Hareesh; Fung, Jason M.; Sadeghi, Ahmad-Reza; Rajendran, Jeyavijayan |
---|
Datum | 2018 |
---|
Art | Journal Article |
---|
Abstrakt | Modern computer systems are becoming faster,
more efficient, and increasingly interconnected with each generation. Consequently, these platforms also grow more complex,
with continuously new features introducing the possibility of new
bugs. Hence, the semiconductor industry employs a combination
of different verification techniques to ensure the security of
System-on-Chip (SoC) designs during the development life cycle.
However, a growing number of increasingly sophisticated attacks
are starting to leverage cross-layer bugs by exploiting subtle interactions between hardware and software, as recently demonstrated
through a series of real-world exploits with significant security
impact that affected all major hardware vendors. |
---|
In | Cryptography and Security |
---|
Url | https://tubiblio.ulb.tu-darmstadt.de/id/eprint/110844 |
---|