IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Abstract A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can still be secretly introduced into the processo...
Saved in:
Main Authors: | Yuze Wang, Peng Liu, Yingtao Jiang |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2022-07-01
|
Series: | IET Information Security |
Subjects: | |
Online Access: | https://doi.org/10.1049/ise2.12059 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Instruction : some contemporary view points /
Published: (1967) -
Aspects of How Teachers and Students Use Instructional Materials for Effective Instructional and Learning of History.
by: Chimpaye, Edith
Published: (2024) -
Does the instructional approach really matter? A comparative study of the impact of online and in-person instruction on learner engagement
by: Zhiyong Li, et al.
Published: (2025-03-01) -
Principal-shared instructional leadership in differentiated instruction classrooms: its effect on pedagogical practices
by: Pipit Pudji Astutik, et al.
Published: (2024-08-01) -
Does instruction through mother tongue impede students’ English proficiency? public skepticism on the instructional language policy in the state of Amhara
by: Melaku Gebremeske
Published: (2023-05-01)