IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Abstract A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still be secretly introduced into the processo...
Saved in:
Main Authors: | Yuze Wang, Peng Liu, Yingtao Jiang |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2022-07-01
|
Series: | IET Information Security |
Subjects: | |
Online Access: | https://doi.org/10.1049/ise2.12059 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Design and implementation of hardware-based dynamic instruction set randomization framework
by: San DU, et al.
Published: (2017-11-01) -
Instruction : some contemporary view points /
Published: (1967) -
Personality as a Correlate of Accentedness: The Case of Formal Setting Without Pronunciation-Focused Instruction
by: Małgorzata Baran-Łucarz
Published: (2023-12-01) -
Aspects of How Teachers and Students Use Instructional Materials for Effective Instructional and Learning of History.
by: Chimpaye, Edith
Published: (2024) -
Using Instructional Supervision to Improve Learners’ Performance in Eswatini High Schools
by: Naboth Mudavanhu Phebeni, et al.
Published: (2024-12-01)