2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC) 2018
DOI: 10.1109/dac.2018.8465885
|View full text |Cite
|
Sign up to set email alerts
|

STASH: SecuriTy Architecture for Smart Hybrid Memories

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…All off-chip devices, including main memory and memory bus, are considered vulnerable to both passive (snooping) and active (tampering) attacks. These assumptions are essential to secure processor architecture [9], [15], [48], [50], [53], [56], [57].…”
Section: Background and Related Work A Threat Modelmentioning
confidence: 99%
“…All off-chip devices, including main memory and memory bus, are considered vulnerable to both passive (snooping) and active (tampering) attacks. These assumptions are essential to secure processor architecture [9], [15], [48], [50], [53], [56], [57].…”
Section: Background and Related Work A Threat Modelmentioning
confidence: 99%