共 88 条
[51]
Linkov I, 2019, RISK SYST DECIS, P1, DOI 10.1007/978-3-319-77492-3_1
[52]
On Code Execution Tracking via Power Side-Channel
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1019-1031
[53]
Martin ED, 2019, PROCEEDINGS OF THE 2019 10TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT), P161, DOI [10.1109/dessert.2019.8770027, 10.1109/DESSERT.2019.8770027]
[54]
Applying Petri Nets to Modeling of Many-Core Processor Self-Testing when Tests are Performed Randomly
[J].
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS,
2013, 29 (01)
:25-34
[55]
Meng D., 2011, ZTE Technol. J., V1, P1
[56]
A Friend or a Foe? Detecting Malware using Memory and CPU Features
[J].
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4,
2016,
:73-84
[57]
Mukhija A., 2007, Ph.D. Dissertation
[58]
Nataraj L., 2011, Proceedings of Visualization for Cyber Security, P1, DOI DOI 10.1145/2016904.2016908
[59]
EDDIE: EM-Based Detection of Deviations in Program Execution
[J].
44TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2017),
2017,
:333-346