K Murdock, D Oswald, FD Garcia, J Van Bulck, D Gruss… - 2020 - imec-publications.be
In this paper, we demonstrate that these privileged interfaces can be reliably exploited to
undermine the system's security. We present the Plundervolt attack, in which a privileged …