Articles with "hardware performance" as a keyword



Photo from wikipedia

Enabling Hardware Performance Counters for Microkernel-Based Virtualization on Embedded Systems

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3002106

Abstract: Virtualization techniques continue to evolve at rapid speed and have now come to find its application in embedded and mobile computing devices. Virtualization improves the utilization of system resources effectively and also enhances security by… read more here.

Keywords: microkernel based; based virtualization; performance; virtualization ... See more keywords
Photo by framesforyourheart from unsplash

Detecting Spectre Attacks Using Hardware Performance Counters

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2021.3082471

Abstract: Spectre attacks can be catastrophic and widespread because they exploit common design flaws caused by the speculative capabilities in modern processors to leak sensitive data through side channels. Completely fixing the problem would require a… read more here.

Keywords: performance counters; hardware; using hardware; hardware performance ... See more keywords
Photo from wikipedia

Explainable Machine Learning for Intrusion Detection via Hardware Performance Counters

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2022.3149745

Abstract: The exponential proliferation of Malware over the past decade has threatened system security across a plethora of Internet of Things (IoT) devices. Furthermore, the improvements in computer architectures to include speculative branching and out-of-order executions… read more here.

Keywords: intrusion detection; detection; machine learning; hardware performance ... See more keywords
Photo by framesforyourheart from unsplash

Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Postquantum Signature Schemes

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2022.3159749

Abstract: NIST is standardizing postquantum cryptography (PQC) algorithms that are resilient to the computational capability of quantum computers. Past works show malicious subversion with cryptographic software algorithm subversion attacks (ASAs) that weaken the implementations. We show… read more here.

Keywords: performance counters; signature; hardware performance; algorithm subversion ... See more keywords