2021
DOI: 10.1109/tc.2021.3108044
|View full text |Cite
|
Sign up to set email alerts
|

Memory-Aware Denial-of-Service Attacks on Shared Cache in Multicore Real-Time Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…These threats can be minimized at the designing and fabrication phases of the hardware lifecycle, but sometimes it can be inevitable to eliminate them completely due to the functionality expected by the hardware components and also due to some performance enhancing mechanisms used within the components. Secure boot attacks [23], [24], firmware attacks [25], [26], dynamic random access memory threats such as Row hammering attacks [27], [28], [29], cache attacks [30], [31], speculative execution attacks [32], [33], [34], [35] and code reuse attacks [36] are some examples for these types.…”
Section: Hardware Security Threats A) Architectural and System Threatsmentioning
confidence: 99%
“…These threats can be minimized at the designing and fabrication phases of the hardware lifecycle, but sometimes it can be inevitable to eliminate them completely due to the functionality expected by the hardware components and also due to some performance enhancing mechanisms used within the components. Secure boot attacks [23], [24], firmware attacks [25], [26], dynamic random access memory threats such as Row hammering attacks [27], [28], [29], cache attacks [30], [31], speculative execution attacks [32], [33], [34], [35] and code reuse attacks [36] are some examples for these types.…”
Section: Hardware Security Threats A) Architectural and System Threatsmentioning
confidence: 99%