Old Web
English
Sign In
Acemap
>
Paper
>
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design
With Great Complexity Comes Great Vulnerability: Challenges of Secure Processor Design
2020
Ghada Dessouky
Tommaso Frassetto
Patrick Jauernig
Ahmad-Reza Sadeghi
Keywords:
Processor design
Vulnerability
Computer science
Computer security
Correction
Source
Cite
Save
Machine Reading By IdeaReader
0
References
0
Citations
NaN
KQI
[]