共 50 条
- [1] Cryptographic Accelerators for Trusted Execution Environment in RISC-V processors 2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
- [2] An seL4-based Trusted Execution Environment on RISC-V 20TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC 2024, 2024, : 712 - 717
- [5] Oblivious Demand Paging with Ring ORAM in RISC-V Trusted Execution Environments PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1740 - 1745
- [7] Trusted Hart for Mobile RISC-V Security 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1587 - 1596
- [8] RISC-V Power Analysis Attack Mitigation in a GPU Execution Framework 2024 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT CYBER PHYSICAL SYSTEMS AND INTERNET OF THINGS, ICOICI 2024, 2024, : 512 - 517
- [9] HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 187 - 199
- [10] Execution at RISC: Stealth JOP Attacks on RISC-V Applications COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 377 - 391