Cited By
View all- Harrison JAsadizanjani NTehranipoor M(2021)On malicious implants in PCBs throughout the supply chainIntegration10.1016/j.vlsi.2021.03.00279(12-22)Online publication date: Jul-2021
There are several vulnerabilities in computing systems hardware that can be exploited by attackers to carry out devastating microarchitectural timing-based side-channel attacks against these systems and as a result compromise the security of the users of ...
This paper addresses the issue of security in blockchain systems, with a focus on attacks targeting the peer-to-peer architecture. The peer-to-peer nature of blockchain is fundamental to many of the benefits promised by blockchain applications. We ...
Writable XOR executable (W X) and address space layout randomisation (ASLR) have elevated the understanding necessary to perpetrate buffer overflow exploits[1]. However, they have not proved to be a panacea[1---3], and so other mechanisms, such as stack ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inView or Download as a PDF file.
PDFView online with eReader.
eReaderView this article in HTML Format.
HTML Format