Pervasive micro information flow tracking

S Mallissery, KY Chiang, CA Bau… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Detection of advanced security attacks that exploit zero-day vulnerabilities or application-
specific logic loopholes has been challenging due to the lack of attack signatures or …

Secure instruction and data-level information flow tracking model for RISC-V

GS Nicholas, DV Aklekar, B Thakar, F Saqib - Cryptography, 2023 - mdpi.com
With the proliferation of electronic devices, third-party intellectual property (3PIP) integration
in the supply chain of the semiconductor industry and untrusted actors/fields have raised …