M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as a remarkable edge-cloud technology to provide computing facilities to resource-restrained …
Z Pan, P Mishra - IEEE Access, 2022 - ieeexplore.ieee.org
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to support its core functionalities. A typical SoC consists of diverse components gathered from …
W Kosasih, Y Feng, C Chuengsatiansup… - Proceedings of the 19th …, 2024 - dl.acm.org
Sharing microarchitectural components between co-resident programs leads to potential information leaks, with devastating implications on security. Over the last decade, multiple …
The continuous quest for performance pushed processors to incorporate elements such as multiple cores, caches, acceleration units, or speculative execution that make systems very …
Due to the increasing size and complexity of system-on-chips (SoCs), new threats and vulnerabilities are emerging, mainly related to flaws at the system level. Due to the lack of …
Autonomous vehicles are becoming increasingly popular, but their reliance on computer systems to sense and operate in the physical world has introduced new security risks …
Hardware security is currently a very influential domain, where each year countless works are published concerning attacks against hardware and countermeasures. A significant …
L Wang, L Bu, F Song - 2023 60th ACM/IEEE Design …, 2023 - ieeexplore.ieee.org
Cache side-channel attacks (CSCAs), capable of deducing secrets by analyzing timing differences in the shared cache behavior of modern processors, pose a serious security …
Electrical and Computer Engineering Department, Boston University, Boston, MA 02215 USA the program's behavior. As software-level behavioral analysis performs malware …