共 15 条
[1]
A. Ltd, TrustZone for Cortex-A-Arm<(R)
[2]
[Anonymous], Complex Shadow-Stack Updates (Intel<(R)> ControlFlow Enforcement Technology)
[3]
[Anonymous], 2017, Heightened DDoS Threat Posed by Mirai and Other Botnets | CISA
[4]
[Anonymous], Vivado Overview
[5]
[Anonymous], Security in ARMv8-A systems
[6]
[Anonymous], 2018, State of the IoT 2018: Number of IoT devices now at 7B-Market accelerating
[7]
[Anonymous], IoT Connections Worldwide 20222033|Statista
[8]
PREEMPT: PReempting Malware by Examining Embedded Processor Traces
[J].
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC),
2019,
[10]
Evaluation of implementability in a malware detection mechanism using processor information
[J].
2021 NINTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS, CANDARW,
2021,
:313-319