Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
processor design security
biblio
A red team blue team approach towards a secure processor design with hardware shadow stack
Submitted by grigby1 on Thu, 06/07/2018 - 3:02pm
private data access
Trusted Computing
software attacks
security of data
security
RISC-V
return oriented programming attack
Resiliency
resilience
reduced instruction set computing
red team blue team approach
pubcrawl
processor vulnerabilities
processor design security
processor architecture
composability
Payloads
openrisc
open processor architectures
object-oriented programming
object oriented security
Metrics
memory corruption
hardware-software codesign
hardware shadow stack
Hardware
embedded systems
embedded system security
Computer bugs
computer architecture